WO2014193749A1 - Proximity-based services discovery privacy - Google Patents
Proximity-based services discovery privacy Download PDFInfo
- Publication number
- WO2014193749A1 WO2014193749A1 PCT/US2014/039313 US2014039313W WO2014193749A1 WO 2014193749 A1 WO2014193749 A1 WO 2014193749A1 US 2014039313 W US2014039313 W US 2014039313W WO 2014193749 A1 WO2014193749 A1 WO 2014193749A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- temporary
- permanent
- request
- network
- alice
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/0413—MIMO systems
- H04B7/0456—Selection of precoding matrices or codebooks, e.g. using matrices antenna weighting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/0413—MIMO systems
- H04B7/0452—Multi-user MIMO systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/0413—MIMO systems
- H04B7/0456—Selection of precoding matrices or codebooks, e.g. using matrices antenna weighting
- H04B7/0486—Selection of precoding matrices or codebooks, e.g. using matrices antenna weighting taking channel rank into account
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/06—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
- H04B7/0613—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission
- H04B7/0615—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal
- H04B7/0617—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal for beam forming
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/06—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
- H04B7/0613—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission
- H04B7/0615—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal
- H04B7/0619—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal using feedback from receiving side
- H04B7/0621—Feedback content
- H04B7/0626—Channel coefficients, e.g. channel state information [CSI]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/06—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
- H04B7/0613—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission
- H04B7/0615—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal
- H04B7/0619—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal using feedback from receiving side
- H04B7/0621—Feedback content
- H04B7/063—Parameters other than those covered in groups H04B7/0623 - H04B7/0634, e.g. channel matrix rank or transmit mode selection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/06—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
- H04B7/0613—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission
- H04B7/0615—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal
- H04B7/0619—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal using feedback from receiving side
- H04B7/0621—Feedback content
- H04B7/0632—Channel quality parameters, e.g. channel quality indicator [CQI]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/06—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
- H04B7/0613—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission
- H04B7/0615—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal
- H04B7/0619—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal using feedback from receiving side
- H04B7/0636—Feedback format
- H04B7/0639—Using selective indices, e.g. of a codebook, e.g. pre-distortion matrix index [PMI] or for beam selection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/18—Phase-modulated carrier systems, i.e. using phase-shift keying
- H04L27/20—Modulator circuits; Transmitter circuits
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/0289—Congestion control
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/70—Services for machine-to-machine communication [M2M] or machine type communication [MTC]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W92/00—Interfaces specially adapted for wireless communication networks
- H04W92/16—Interfaces between hierarchically similar devices
- H04W92/24—Interfaces between hierarchically similar devices between backbone network devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/75—Temporary identity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/14—Direct-mode setup
Definitions
- Proximity-based applications and services represent a fast growing social and technological trend that may have a major impact on the evolution of cellular wireless/mobile broadband technologies. These services can be based on the awareness that two devices or two users are close to each other and, thus, may be able to directly communicate with each other.
- a method can include transmitting a first temporary identification and first discovery information from a first user equipment (UE), the discovery information authorizing discovery of the first UE; and receiving a request from a second UE to join a device-to-device network with the first UE using a second temporary identification associated with the second UE.
- UE user equipment
- FIG. 1 illustrates generally an example wireless system including D2D users.
- FIG. 2 illustrates an example method of providing D2D discovery privacy using temporary IDs.
- FIG. 3 illustrates generally a method of providing privacy while employing proximity-base services that are assisted by a network resource or element.
- FIG. 4 illustrates generally a method of providing privacy while employing proximity-base services that are assisted by a network resource or element.
- FIG. 5 is a block diagram illustrating an example mobile device upon which any one or more of the techniques (e.g., methodologies) discussed herein may be performed.
- FIG. 6 illustrates a block diagram of an example machine.
- FIG. 7 illustrates a functional block diagram of an example machine 700 (e.g., a UE) in accordance with some embodiments.
- proximity-based services such as 3GPP (Third Generation Partnership Project) proximity-based services
- 3GPP Third Generation Partnership Project
- proximity-based services may include the following aspects for the discovery function as defined in TS 22.101 :
- UE User Equipment
- a discovering ProSe-enabled UE can determine whether or not another ProSe-enabled UE is of interest to it.
- a ProSe-enabled UE is of interest to a discovering ProSe-enabled UE if its proximity needs to be known by one or more
- aProSe-enabled UE can be able to be discoverable by other ProSe-enabled UEs in proximity that are explicitly permitted by the discoverable ProSe- enabled UE.
- the ProSe-enabled UEs can be served by
- ProSe can support the simultaneous operation of a large number of applications on a ProSe-enabled UE, ensuring that the 3GPP system provides ProSe Discovery proximity information only to applications that are authorized by the
- the ProSe system can allow both granting
- FIG. 1 illustrates generally an example wireless system 100 including D2D users (a typical few labeled 101) operating and coexisting with traditional cellular users.
- D2D users 101 do not necessarily need to communicate via the central coordinator (eNodeB) 102.
- the D2D users 101 can communicate directly with each other or through hops 103 of other D2D users.
- eNodeB 102 When D2D communication shares the same resources with the mobile broadband system, certain functions can still be controlled and coordinated by the eNodeB 102 of the mobile broadband network such as when centralized control offers more benefits.
- proximity sensing methods can be implemented by the network through monitoring the UE attachment/association to a particular cell or using location based services and protocols.
- new proximity based functionality can be added to the functions of the D2D coordinator. For example, a special device discovery zone can be allocated in the D2D transmission region where device discovery signaling is used to assist in D2D cluster organization and D2D link
- a special discovery signal transmission interval can be introduced in the D2D transmission region for that purpose. Additionally, proximity sensing can be based on D2D link quality measurements.
- a temporary ID can be allocated to each D2D UE.
- a temporary ID can be allocated to each D2D application available to a UE.
- the temporary ID can be changed often and frequently.
- the temporary ID can be published such as by the UE itself or by network resources without revealing the permanent ID of the UE or the user.
- the temporary ID can be randomly generated in the
- the temporary ID can be generated using a permutation algorithm running on the UE and running simultaneously on a network resource.
- a UE or an application running on the UE can request that a discovered UE's temporary ID be resolved.
- the request can be serviced by a network resource.
- the discovered UE can service the request using direct communications with the requesting UE or requesting application.
- the request can be answered with the permanent identity of the discovered UE or the discovered application.
- the request can be answered with the permanent identity of the discovered UE or the discovered application only if the requesting UE or application has been authorized.
- the present subject matter provides a layer of user privacy protection to D2D enabled devices. Without such protection, D2D communication services, such as ProSe services, would reveal user IDs and, in some situations, would reveal user IDs in combination with current location information of the user's UE. As such, without additional privacy protection, proximity services, such as ProSe services, can be a threat to a user's identity information (e.g., identity threat) as well as a physical threat as it can provide location information of the user. Some privacy solutions can be implemented in the application layer, however, applications in open mobile operating systems, in general, cannot be trusted to provide privacy protection or relied on to provide adequate privacy protection.
- the present subject matter provides privacy protection at the system level. In certain examples, system level privacy protection can be provided. In some examples, system privacy systems do not deliver ProSe discovery information to applications. In addition, ProSe discovery data is encrypted such that unauthorized applications are not able to decrypt the information.
- privacy protection can include an allocation between a permanent user ID, such as an e-mail address or an application specific e-mail address (e.g., john.doe@facebook.com) and a temporary ID (e.g.,
- resolution of the temporary ID can reveal the permanent ID.
- resolution of the temporary ID can be done by the network or a network resource.
- resolution of the temporary ID can be done at an authorized UE such as at the discoverable UE or an authorized UE receiving discovery information including the temporary ID.
- a UE once discovered can be recognized for the time the temporary ID is valid (e.g., for the time the temporary ID remains the same) for the time the temporary ID is valid (e.g., for the time the temporary ID remains the same) a UE once discovered can be recognized.
- a discoverer UE after the temporary ID has been changed, a discoverer UE cannot recognize the UE associated with the new temporary ID and can request a new resolution of the new temporary ID. In some examples, if authorization of a specific user, application or UE is revoked, the temporary ID can be changed and each request by the revoked user, application or UE can be denied. In certain examples, temporary ID allocations to provide privacy to proximity-base service users can be especially beneficial where discovery information can be automatically broadcast by a UE without the network to assist the discovery function.
- allocation between temporary IDs and the permanent ID of the UE can be stored at the UE.
- allocation between temporary IDs and the permanent ID of the UE can be stored on network resources.
- allocation messages are exchanges between the network and the UE.
- temporary ID allocations can be generated using a synchronized (e.g., time-based) permutation algorithm.
- a permutation function of such a system can be to encrypt the current date/time with a pre-shared secret. It is understood that there are other permutation functions that are possible without departing from the scope of the present subject matter.
- time-based permutation functions in certain examples, can significantly reduce the number of messages between a UE and the network.
- FIG. 2 illustrates an example method 200 of providing D2D discovery privacy using temporary IDs.
- Alice's UE is a subscriber of ProSe offered by operator A.
- Bob's UE is a subscriber of ProSe offered by operator B.
- David is also a subscriber of ProSe offered by operator B.
- Alice, Bob, and Dave use ProSe with different applications. They use different permanent IDs for these different applications.
- Dave likes to play chess and he uses a ProSe enabled application called "chess-pal”. He authorizes every user of chess- pal in proximity to discover him as potential chess player.
- His permanent identity for this application is "dave72@chesspal.com”.
- Alice, Bob, and Dave also belong to or are registered on a social website, such as Facebook.
- There permanent IDs are "alice@facebook.com", "bob@facebook.com”, and
- each permanent identity e.g., facebook and chess-pal
- each permanent identity can be allocated to a temporary ID. The IDs for this example are listed in the following table.
- the first two letters can signal the type of application.
- SM can indicate that the temporary ID is an ID for social media like Facebook or google+.
- GA can indicate that the temporary ID is an ID for gaming like chess- pal or WoW.
- Another example of temporary IDs could just replace the personal permanent part of the ID with an alias such as
- OJFXGUOIJCS3PKM5 @facebook.com the specific application can be indicated and the information that a user of this application is in proximity is revealed, but the identity of the user is still unknown.
- a user setting can be used to determine which format to use for discovery.
- D2D discovery can progress as follows:
- All proximity service enabled UEs are sending their temporary IDs.
- Alice's UE is broadcasting "SM-OJFXGUOIJCS3PKM5".
- Bob's UE is broadcasting "SM-D62321VQT8INCNMT”.
- Dave's UE is broadcasting "SM-BPO74QJMTFEAK6H0, GA-9IPGPJB7E91703AW”.
- Dave is sending all the temporary Ids he wants to be discoverable with. If Alice and Bob are in proximity to each other, their UEs are receiving the beacons from the other UEs.
- the ProSe enabled facebook application running on Bob's UE can transmit a request message at 203 requesting to resolve Alice's temporary ID.
- security can be in place (e.g. a digital signature) to ensure that the request is sent by an operator-authorized user and application.
- the request can also contain a resolution number (e.g., 3456).
- Alice's UE can receive the request.
- Alice can have her UE resolve her temporary ID without knowing who made the request.
- Alice can try to identify the requestor before resolving or denying the resolution request.
- Such identification methods can include, but are not limited to, sending text messages asking who is at or near her location, looking around and trying to identify people she may know, such as her friend Bob, and then verifying that he sent the request including using the resolution number. If questioned, either online or offline, Bob can confirm he sent the request with the resolution number.
- Alice can authorize the resolution.
- Alice's UE can resolve her temporary ID, and at 207, Alice's UE can send her permanent ID to Bob's UE.
- the Alice's permanent ID can be sent using D2D communications.
- the permanent ID information can be protected such as through encryption such that Alice's permanent ID remains confidential except to the application running on Bob's UE.
- a similar method of authorization can take place if a social media application running on Bob's UE was discovered by Alice's UE.
- the allocation between permanent ID and temporary ID of Bob can be stored in Alice's UE.
- the allocation between permanent ID and temporary ID of Alice can be stored in Bob's UE, such as at 208.
- Bob and Alice can discover each other.
- Alice's facebook application can prompt her whenever Bob's UE is in proximity and vice versa.
- FIG. 3 illustrates generally a method 300 of providing privacy while employing proximity-base services that are assisted by a network resource or element.
- the network can allocate temporary IDs including temporary IDs to Alice's and Bob's UEs.
- Alice's UE can broadcast discovery information including her social media temporary ID.
- Bob's UE can broadcast discovery information including his social media temporary ID.
- Bob's UE can request resolution of Alice's temporary ID from a network resource or entity.
- the network can check if Bob's UE is authorized to have Alice's temporary ID resolved.
- Alice may have previously authorization the network to resolve her temporary ID for Bob in response to a previous request or because Bob, or his temporary ID, is on a list Alice provided to the network that can allow the network to provide automatic resolution of Alice's temporary ID in response to a request from Bob's UE.
- the network can send Alice's permanent ID to Bob's UE. If Bob is not an authorized user of the application, the network can deny Bob's resolution request. In certain examples, if Bob is not an authorized by Alice to have Alice's temporary ID resolved, Alice can have the network deny Bob's resolution request.
- Alice can inquire online, such as through e- mail or text messaging, or offline, such as by looking around to learn the identity of Bob, and then authorize the network to resolve her temporary ID or deny Bob's resolution request.
- Alice's UE can send a request to resolve Bob's temporary social media ID.
- the network can check whether Alice's UE is authorized to have Bob's social media temporary ID resolved. In certain examples, if the network can not find authorization for Alice' s request, the network can deny the request or the network can prompt Bob via Bob's UE to accept or deny the request.
- the network can send Bob's permanent ID to Alice's UE.
- FIG. 4 illustrates generally a method 400 of providing privacy while employing proximity-base services that are assisted by a network resource or element.
- a network can allocate temporary IDs and can perform the resolution between temporary ID and permanent ID.
- such privacy functionality can be provided by a new network resource or entity that could be referred to as a ProSe-Server.
- the privacy functionality could be implemented as a logical entity in an existing network element or resource.
- the network can allocate temporary IDs to the UEs of Alice and Dave.
- Alice can authorized the network to resolve her temporary ID for Dave's UE when the UEs are in proximity to each other.
- the authorization can be stored on a network resource or entity.
- the authorization can be deleted from the network.
- Alice's temporary ID can be changed or replaced by the network in response to the revocation of authorization.
- Dave's UE could transmit a request to resolve the temporary ID.
- the network can check for an authorization, and because no authorization exists, the network, at 411, can deny the request. In some examples, the network may provide a notification to Alice's UE indicating a request for resolution of her temporary ID and allow Alice to decide whether to authorize the resolution or deny the request.
- a request sent from Bob's UE to Alice's UE can be authorized since a request from Bob's UE is still authorized by Alice.
- a request from bob's UE to Alice's UE can be resolved without interaction on Alice's part.
- Alice's new or replacement temporary ID could be sent to previously authorized UEs such that Alice's discovery information can be recognized by the authorized UEs.
- the new temporary ID can be sent to the authorized UEs via the network, via D2D communication, or via combinations of network communications and D2D communications.
- FIG. 5 is a block diagram illustrating an example mobile device 500, upon which any one or more of the techniques (e.g., methodologies) discussed herein may be performed.
- the mobile device 500 may include a processor 510.
- the processor 510 may be any of a variety of different types of commercially available processors suitable for mobile devices, for example, an XScale architecture microprocessor, a Microprocessor without Interlocked Pipeline Stages (MIPS) architecture processor, or another type of processor.
- a memory 520 such as a Random Access Memory (RAM), a Flash memory, or other type of memory, is typically accessible to the processor 510.
- the memory 520 may be adapted to store an operating system (OS) 530, as well as application programs 540.
- OS operating system
- the OS 530 or application programs 540 may include instructions stored on a computer readable medium (e.g., memory 520) that may cause the processor 510 of the mobile device 500 to perform any one or more of the techniques discussed herein.
- the processor 510 may be coupled, either directly or via appropriate intermediary hardware, to a display 550 and to one or more input/output (I/O) devices 560, such as a keypad, a touch panel sensor, a microphone, etc.
- the processor 510 may be coupled to a transceiver 570 that interfaces with an antenna 590.
- the transceiver 570 may be configured to both transmit and receive cellular network signals, wireless data signals, or other types of signals via the antenna 590, depending on the nature of the mobile device 500. Further, in some embodiment
- a GPS receiver 580 may also make use of the antenna 590 to receive GPS signals.
- FIG. 6 illustrates a block diagram of an example machine 600 upon which any one or more of the techniques (e.g., methodologies) discussed herein may be performed.
- the machine 600 may operate as a standalone device or may be connected (e.g., networked) to other machines. In a networked deployment, the machine 600 may operate in the capacity of a server machine, a client machine, or both in server-client network environments. In an example, the machine 600 may act as a peer machine in peer-to-peer (P2P) (or other distributed) network environment.
- the machine 600 may be a personal computer (PC), a tablet PC, a Personal Digital Assistant (PDA), a mobile telephone, a web appliance, or any machine capable of executing instructions (sequential or otherwise) that specify actions to be taken by that machine.
- PC personal computer
- PDA Personal Digital Assistant
- machine shall also be taken to include any collection of machines that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein, such as cloud computing, software as a service (SaaS), other computer cluster configurations.
- cloud computing software as a service
- SaaS software as a service
- Examples, as described herein, may include, or may operate on, logic or a number of components, modules, or mechanisms.
- Modules are tangible entities capable of performing specified operations and may be configured or arranged in a certain manner.
- circuits may be arranged (e.g., internally or with respect to external entities such as other circuits) in a specified manner as a module.
- the whole or part of one or more computer systems (e.g., a standalone, client or server computer system) or one or more hardware processors may be configured by firmware or software (e.g., instructions, an application portion, or an application) as a module that operates to perform specified operations.
- the software may reside (1) on a non-transitory machine-readable medium or (2) in a transmission signal.
- the software when executed by the underlying hardware of the module, causes the hardware to perform the specified operations.
- module is understood to encompass a tangible entity, be that an entity that is physically constructed, specifically configured (e.g., hardwired), or temporarily (e.g., transitorily) configured (e.g.,
- each of the modules need not be instantiated at any one moment in time.
- the modules comprise a general-purpose hardware processor configured using software
- the general-purpose hardware processor may be configured as respective different modules at different times.
- Software may accordingly configure a hardware processor, for example, to constitute a particular module at one instance of time and to constitute a different module at a different instance of time.
- Machine 600 may include a hardware processor 602 (e.g., a processing unit, a graphics processing unit (GPU), a hardware processor core, or any combination thereof), a main memory 604, and a static memory 606, some or all of which may communicate with each other via a link 608 (e.g., a bus, link, interconnect, or the like).
- the machine 600 may further include a display device 610, an input device 612 (e.g., a keyboard), and a user interface (UI) navigation device 614 (e.g., a mouse).
- the display device 610, input device 612, and UI navigation device 614 may be a touch screen display.
- the machine 600 may additionally include a mass storage (e.g., drive unit) 616, a signal generation device 618 (e.g., a speaker), a network interface device 620, and one or more sensors 621, such as a global positioning system (GPS) sensor, camera, video recorder, compass, accelerometer, or other sensor.
- the machine 600 may include an output controller 628, such as a serial (e.g., universal serial bus (USB), parallel, or other wired or wireless (e.g., infrared (I )) connection to communicate or control one or more peripheral devices (e.g., a printer, card reader, etc.).
- a serial e.g., universal serial bus (USB)
- parallel e.g., parallel, or other wired or wireless (e.g., infrared (I ) connection to communicate or control one or more peripheral devices (e.g., a printer, card reader, etc.).
- I infrared
- the mass storage 616 may include a machine -readable medium 622 on which is stored one or more sets of data structures or instructions 624 (e.g., software) embodying or utilized by any one or more of the techniques or functions described herein.
- the instructions 624 may also reside, completely or at least partially, within the main memory 604, within static memory 606, or within the hardware processor 602 during execution thereof by the machine 600.
- one or any combination of the hardware processor 602, the main memory 604, the static memory 606, or the mass storage 616 may constitute machine-readable media.
- machine -readable medium 622 is illustrated as a single medium, the term “machine readable medium” may include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that configured to store the one or more instructions 624.
- machine readable medium may include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that configured to store the one or more instructions 624.
- machine-readable medium may include any tangible medium that is capable of storing, encoding, or carrying instructions for execution by the machine 600 and that cause the machine 600 to perform any one or more of the techniques of the present disclosure, or that is capable of storing, encoding or carrying data structures used by or associated with such instructions.
- Non- limiting machine -readable medium examples may include solid-state memories, and optical and magnetic media.
- machine-readable media may include: non- volatile memory, such as semiconductor memory devices (e.g., Electrically Programmable Read-Only Memory (EPROM), Electrically Erasable Programmable Read-Only Memory (EEPROM)) and flash memory devices; magnetic disks, such as internal hard disks and removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks.
- non- volatile memory such as semiconductor memory devices (e.g., Electrically Programmable Read-Only Memory (EPROM), Electrically Erasable Programmable Read-Only Memory (EEPROM)) and flash memory devices
- EPROM Electrically Programmable Read-Only Memory
- EEPROM Electrically Erasable Programmable Read-Only Memory
- flash memory devices e.g., Electrically Erasable Programmable Read-Only Memory (EEPROM)
- EPROM Electrically Programmable Read-Only Memory
- EEPROM Electrically Erasable Programmable Read-Only Memory
- the instructions 624 may further be transmitted or received over a communications network 626 using a transmission medium via the network interface device 620 utilizing any one of a number of transfer protocols (e.g., frame relay, internet protocol (IP), transmission control protocol (TCP), user datagram protocol (UDP), hypertext transfer protocol (HTTP), etc.).
- transfer protocols e.g., frame relay, internet protocol (IP), transmission control protocol (TCP), user datagram protocol (UDP), hypertext transfer protocol (HTTP), etc.
- transmission medium shall be taken to include any intangible medium that is capable of storing, encoding or carrying instructions for execution by the machine 600, and includes digital or analog communications signals or other intangible medium to facilitate communication of such software.
- Embodiments may be implemented in one or a combination of hardware, firmware and software. Embodiments may also be implemented as instructions stored on a computer-readable storage device, which may be read and executed by at least one processor to perform the operations described herein.
- a computer-readable storage device may include any non-transitory mechanism for storing information in a form readable by a machine (e.g., a computer).
- a computer-readable storage device may include read-only memory (ROM), random-access memory (RAM), magnetic disk storage media, optical storage media, flash-memory devices, and other storage devices and media.
- FIG. 7 illustrates a functional block diagram of an example machine 700 (e.g., a UE) in accordance with some embodiments.
- the UE 700 may include physical layer circuitry 702 for transmitting and receiving signals to and from eNBs using one or more antennas 701.
- UE 700 may also include processing circuitry 706 that may include, among other things a channel estimator.
- UE 700 may also include a memory 708.
- the processing circuitry may be configured to determine several different feedback values discussed below for transmission to the eNB.
- the processing circuitry may also include a media access control (MAC) layer 704.
- MAC media access control
- the UE 700 may include one or more of a keyboard, a display, a non-volatile memory port, multiple antennas, a graphics processor, an application processor, speakers, and other mobile device elements.
- the display may be an LCD screen including a touch screen.
- the one or more antennas 701 utilized by the UE 700 may comprise one or more directional or omnidirectional antennas, including, for example, dipole antennas, monopole antennas, patch antennas, loop antennas, microstrip antennas or other types of antennas suitable for transmission of RF signals.
- a single antenna with multiple apertures may be used instead of two or more antennas.
- each aperture may be considered a separate antenna.
- MIMO multiple- input multiple-output
- the antennas may be effectively separated to take advantage of spatial diversity and the different channel characteristics that may result between each of antennas and the antennas of a transmitting station.
- the antennas may be separated by up to 1/10 of a wavelength or more.
- the UE 700 is illustrated as having several separate functional elements, one or more of the functional elements may be combined and may be implemented by combinations of software-configured elements, such as processing elements including digital signal processors (DSPs), and/or other hardware elements.
- DSPs digital signal processors
- some elements may comprise one or more microprocessors, DSPs, application specific integrated circuits (ASICs), radio- frequency integrated circuits (RFICs) and combinations of various hardware and logic circuitry for performing at least the functions described herein.
- the functional elements may refer to one or more processes operating on one or more processing elements.
- Embodiments may be implemented in one or a combination of hardware, firmware and software. Embodiments may also be implemented as instructions stored on a computer-readable storage medium, which may be read and executed by at least one processor to perform the operations described herein.
- a computer-readable storage medium may include any non-transitory mechanism for storing information in a form readable by a machine (e.g., a computer).
- a computer-readable storage medium may include read-only memory (ROM), random-access memory (RAM), magnetic disk storage media, optical storage media, flash-memory devices, and other storage devices and media.
- ROM read-only memory
- RAM random-access memory
- magnetic disk storage media e.g., magnetic disks, optical storage media, flash-memory devices, and other storage devices and media.
- one or more processors of the UE 700 may be configured with the instructions to perform the operations described herein.
- the UE 700 may be configured to receive OFDM communication signals over a multicarrier communication channel in accordance with an OFDMA communication technique.
- the OFDM signals may comprise a plurality of orthogonal subcarriers.
- eNBs (including macro eNB and pico eNBs) may be part of a broadband wireless access (BWA) network communication network, such as a Worldwide Interoperability for Microwave Access (WiMAX) communication network or a 3rd Generation Partnership Project (3GPP) Universal Terrestrial Radio Access Network (UTRAN) Long-Term-Evolution (LTE) or a Long-Term- Evolution (LTE) communication network, although the scope of the inventive subject matter described herein is not limited in this respect.
- the UE 700 and the eNBs may be configured to communicate in accordance with an orthogonal frequency division multiple access (OFDMA) technique.
- OFDMA orthogonal frequency division multiple access
- 3GPP Generation Partnership Project
- the basic unit of the wireless resource is the Physical Resource Block (PRB).
- the PRB may comprise 12 sub-carriers in the frequency domain x 0.5 ms in the time domain.
- the PRBs may be allocated in pairs (in the time domain).
- the PRB may comprise a plurality of resource elements (REs).
- a RE may comprise one sub-carrier x one symbol.
- Two types of reference signals may be transmitted by an eNB including demodulation reference signals (DM-RS), channel state information reference signals (CIS-RS) and/or a common reference signal (CRS).
- DM-RS demodulation reference signals
- CIS-RS channel state information reference signals
- CRS common reference signal
- the DM-RS may be used by the UE for data demodulation.
- the reference signals may be transmitted in predetermined PRBs.
- the OFDMA technique may be either a frequency domain duplexing (FDD) technique that uses different uplink and downlink spectrum or a time-domain duplexing (TDD) technique that uses the same spectrum for uplink and downlink.
- FDD frequency domain duplexing
- TDD time-domain duplexing
- the UE 700 and the eNBs may be configured to communicate signals that were transmitted using one or more other modulation techniques such as spread spectrum modulation (e.g., direct sequence code division multiple access (DS-CDMA) and/or frequency hopping code division multiple access (FH-CDMA)), time-division multiplexing (TDM) modulation, and/or frequency-division multiplexing (FDM) modulation, although the scope of the embodiments is not limited in this respect.
- spread spectrum modulation e.g., direct sequence code division multiple access (DS-CDMA) and/or frequency hopping code division multiple access (FH-CDMA)
- TDM time-division multiplexing
- FDM frequency-division multiplexing
- the UE 700 may be part of a portable wireless communication device, such as a PDA, a laptop or portable computer with wireless communication capability, a web tablet, a wireless telephone, a wireless headset, a pager, an instant messaging device, a digital camera, an access point, a television, a medical device (e.g., a heart rate monitor, a blood pressure monitor, etc.), or other device that may receive and/or transmit information wirelessly.
- a portable wireless communication device such as a PDA, a laptop or portable computer with wireless communication capability, a web tablet, a wireless telephone, a wireless headset, a pager, an instant messaging device, a digital camera, an access point, a television, a medical device (e.g., a heart rate monitor, a blood pressure monitor, etc.), or other device that may receive and/or transmit information wirelessly.
- a portable wireless communication device such as a PDA, a laptop or portable computer with wireless communication capability, a web tablet, a wireless telephone, a wireless headset,
- the UE 700 may calculate several different feedback values which may be used to perform channel adaption for closed-loop spatial multiplexing transmission mode.
- These feedback values may include a channel-quality indicator (CQI), a rank indicator (RI) and a precoding matrix indicator (PMI).
- CQI channel-quality indicator
- RI rank indicator
- PMI precoding matrix indicator
- the RI informs the transmitter about the number of useful transmission layers for the current MIMO channel
- the PMI indicates the codebook index of the precoding matrix (depending on the number of transmit antennas) that is applied at the transmitter.
- the code rate used by the eNB may be based on the CQI.
- the PMI may be a vector that is calculated by the UE and reported to the eNB.
- the UE may transmit a physical uplink control channel (PUCCH) of format 2, 2a or 2b containing the CQI/PMI or RI.
- the CQI may be an indication of the downlink mobile radio channel quality as experienced by the UE 700.
- the CQI allows the UE 700 to propose to an eNB an optimum modulation scheme and coding rate to use for a given radio link quality so that the resulting transport block error rate would not exceed a certain value, such as 10%.
- the UE may report a wideband CQI value which refers to the channel quality of the system bandwidth.
- the UE may also report a sub-band CQI value per sub-band of a certain number of resource blocks which may be configured by higher layers.
- the full set of sub-bands may cover the system bandwidth.
- a CQI per code word may be reported.
- the PMI may indicate an optimum precoding matrix to be used by the eNB for a given radio condition.
- the PMI value refers to the codebook table.
- the network configures the number of resource blocks that are represented by a PMI report.
- multiple PMI reports may be provided. PMI reports may also be provided for closed loop spatial multiplexing, multi-user MIMO and closed-loop rank 1 precoding MIMO modes.
- the network may be configured for joint transmissions to a UE in which two or more
- cooperating/coordinating points such as remote-radio heads (RRHs) transmit jointly.
- the joint transmissions may be MIMO transmissions and the cooperating points are configured to perform joint beamforming.
- wireless network access providers of all types including, but not limited to, mobile broadband providers looking to increase cellular offload ratios for cost- avoidance and performance gains, fixed broadband providers looking to extend their coverage footprint outside of customers' homes or businesses, wireless network access providers looking to monetize access networks via access consumers or venue owners, public venues looking to provide wireless network (e.g., Internet) access, or digital services (e.g. location services, advertisements, entertainment, etc.) over a wireless network, and business, educational or non- profit enterprises that desire to simplify guest Internet access or Bring- Your- Own-Device (BYOD) access.
- wireless network access providers of all types including, but not limited to, mobile broadband providers looking to increase cellular offload ratios for cost- avoidance and performance gains, fixed broadband providers looking to extend their coverage footprint outside of customers' homes or businesses, wireless network access providers looking to monetize access networks via access consumers or venue owners, public venues looking to provide wireless network (e.g., Internet) access, or digital services (e.g. location services, advertisements, entertainment, etc.) over a
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
- Radio Transmission System (AREA)
Abstract
This application discusses, among other things, apparatus and methods for providing device-to-device (D2D) discovery privacy. In an example, a method can include transmitting a first temporary identification and first discovery information from a first user equipment (UE), the discovery information authorizing discovery of the first UE; and receiving a request from a second UE to join a device-to-device network with the first UE using a second temporary identification associated with the second UE.
Description
PROXIMITY-BASED SERVICES DISCOVERY PRIVACY
CLAIM OF PRIORITY AND RELATED APPLICATIONS
This patent application claims the benefit of priority to U.S. Patent Application Serial No. 14/141,843, filed December 27, 2013, which claims the benefit of priority to U.S. Provisional Patent Application No. 61/829,968, filed May 31 , 2013, each of which is hereby incorporated by reference herein in its entirety.
BACKGROUND
Proximity-based applications and services (ProSe) represent a fast growing social and technological trend that may have a major impact on the evolution of cellular wireless/mobile broadband technologies. These services can be based on the awareness that two devices or two users are close to each other and, thus, may be able to directly communicate with each other.
OVERVIEW
This application discusses, among other things, apparatus and methods for providing device-to-device (D2D) discovery privacy. In an example, a method can include transmitting a first temporary identification and first discovery information from a first user equipment (UE), the discovery information authorizing discovery of the first UE; and receiving a request from a second UE to join a device-to-device network with the first UE using a second temporary identification associated with the second UE.
This overview is intended to provide a general overview of subject matter of the present patent application. It is not intended to provide an exclusive or exhaustive explanation of the invention. The detailed description is included to provide further information about the present patent application.
BRIEF DESCRIPTION OF THE DRAWINGS
In the drawings, which are not necessarily drawn to scale, like numerals may describe similar components in different views. Like numerals having different letter suffixes may represent different instances of similar components. The drawings illustrate generally, by way of example, but not by way of limitation, various embodiments discussed in the present document.
FIG. 1 illustrates generally an example wireless system including D2D users.
FIG. 2 illustrates an example method of providing D2D discovery privacy using temporary IDs.
FIG. 3 illustrates generally a method of providing privacy while employing proximity-base services that are assisted by a network resource or element.
FIG. 4 illustrates generally a method of providing privacy while employing proximity-base services that are assisted by a network resource or element.
FIG. 5 is a block diagram illustrating an example mobile device upon which any one or more of the techniques (e.g., methodologies) discussed herein may be performed.
FIG. 6 illustrates a block diagram of an example machine.
FIG. 7 illustrates a functional block diagram of an example machine 700 (e.g., a UE) in accordance with some embodiments.
DETAILED DESCRIPTION
In certain wireless protocols, D2D communications have been attempting some form of standardization. For example, proximity-based services (ProSe), such as 3GPP (Third Generation Partnership Project) proximity-based services, may include the following aspects for the discovery function as defined in TS 22.101 :
Based on operator policy and user choice,
proximity of two ProSe-enabled devices
(sometimes referred to as User Equipment, or
"UEs") can be determinable; for example, using
direct radio signals or via the operator network;
A discovering ProSe-enabled UE can determine whether or not another ProSe-enabled UE is of interest to it. A ProSe-enabled UE is of interest to a discovering ProSe-enabled UE if its proximity needs to be known by one or more
authorized applications on the discovering ProSe- enabled UE;
Subject to user and operator settings,
aProSe-enabled UE can be able to be discoverable by other ProSe-enabled UEs in proximity that are explicitly permitted by the discoverable ProSe- enabled UE.
The ProSe-enabled UEs can be served by
the same or different PLMN, including when
roaming.
All requirements for ProSe Discovery can
also apply when one or both of the ProSe-enabled UEs involved in ProSe Discovery are roaming in a VPLMN.
ProSe can support the simultaneous operation of a large number of applications on a ProSe-enabled UE, ensuring that the 3GPP system provides ProSe Discovery proximity information only to applications that are authorized by the
3 GPP operator.
The ProSe system can allow both granting
and revocation of discovery permissions.
FIG. 1 illustrates generally an example wireless system 100 including D2D users (a typical few labeled 101) operating and coexisting with traditional cellular users. Unlike the existing traditional LTE network infrastructure, D2D users 101 do not necessarily need to communicate via the central coordinator
(eNodeB) 102. In certain examples, the D2D users 101 can communicate directly with each other or through hops 103 of other D2D users. When D2D communication shares the same resources with the mobile broadband system, certain functions can still be controlled and coordinated by the eNodeB 102 of the mobile broadband network such as when centralized control offers more benefits.
In certain examples, proximity sensing methods can be implemented by the network through monitoring the UE attachment/association to a particular cell or using location based services and protocols. In addition to these traditional methods, new proximity based functionality can be added to the functions of the D2D coordinator. For example, a special device discovery zone can be allocated in the D2D transmission region where device discovery signaling is used to assist in D2D cluster organization and D2D link
establishment. A special discovery signal transmission interval can be introduced in the D2D transmission region for that purpose. Additionally, proximity sensing can be based on D2D link quality measurements.
In addition to the above aspects of a D2D communication system, the present inventors have recognized methods and apparatus for providing privacy of permanent identification (ID) information of a UE during the discovery function by using temporary IDs. In certain examples, privacy can be provided during the discovery function, such as the ProSe discovery function while also fulfilling all the above-listed services. This description often references the ProSe discovery function, but it is understood that certain aspects of the present subject matter are possible with other D2D protocols and discovery activities. In certain examples, a temporary ID can be allocated to each D2D UE. In certain examples, a temporary ID can be allocated to each D2D application available to a UE. In some examples, the temporary ID can be changed often and frequently. In some examples, the temporary ID can be published such as by the UE itself or by network resources without revealing the permanent ID of the UE or the user.
In certain examples, the temporary ID can be randomly generated in the
UE network resources and sent to the UE. In some examples, the temporary ID can be generated using a permutation algorithm running on the UE and running simultaneously on a network resource. In certain examples, a UE or an
application running on the UE can request that a discovered UE's temporary ID be resolved. In certain examples, the request can be serviced by a network resource. In some examples, the discovered UE can service the request using direct communications with the requesting UE or requesting application. In certain examples, the request can be answered with the permanent identity of the discovered UE or the discovered application. In some examples, the request can be answered with the permanent identity of the discovered UE or the discovered application only if the requesting UE or application has been authorized.
In certain examples, the present subject matter provides a layer of user privacy protection to D2D enabled devices. Without such protection, D2D communication services, such as ProSe services, would reveal user IDs and, in some situations, would reveal user IDs in combination with current location information of the user's UE. As such, without additional privacy protection, proximity services, such as ProSe services, can be a threat to a user's identity information (e.g., identity threat) as well as a physical threat as it can provide location information of the user. Some privacy solutions can be implemented in the application layer, however, applications in open mobile operating systems, in general, cannot be trusted to provide privacy protection or relied on to provide adequate privacy protection. The present subject matter provides privacy protection at the system level. In certain examples, system level privacy protection can be provided. In some examples, system privacy systems do not deliver ProSe discovery information to applications. In addition, ProSe discovery data is encrypted such that unauthorized applications are not able to decrypt the information.
In certain examples, privacy protection can include an allocation between a permanent user ID, such as an e-mail address or an application specific e-mail address (e.g., john.doe@facebook.com) and a temporary ID (e.g.,
34ff8el08a23cc). In some examples, resolution of the temporary ID can reveal the permanent ID. In certain examples, resolution of the temporary ID can be done by the network or a network resource. In some examples, resolution of the temporary ID can be done at an authorized UE such as at the discoverable UE or an authorized UE receiving discovery information including the temporary ID.
In some examples, for the time the temporary ID is valid (e.g., for the time the temporary ID remains the same) a UE once discovered can be recognized.
In certain examples, after the temporary ID has been changed, a discoverer UE cannot recognize the UE associated with the new temporary ID and can request a new resolution of the new temporary ID. In some examples, if authorization of a specific user, application or UE is revoked, the temporary ID can be changed and each request by the revoked user, application or UE can be denied. In certain examples, temporary ID allocations to provide privacy to proximity-base service users can be especially beneficial where discovery information can be automatically broadcast by a UE without the network to assist the discovery function.
As discussed above, in some examples, allocation between temporary IDs and the permanent ID of the UE can be stored at the UE. In some examples, where ProSe discovery is assisted by the network, allocation between temporary IDs and the permanent ID of the UE can be stored on network resources. In some examples, in order to change a temporary ID, allocation messages are exchanges between the network and the UE. In some examples, temporary ID allocations can be generated using a synchronized (e.g., time-based) permutation algorithm. In an example, a permutation function of such a system can be to encrypt the current date/time with a pre-shared secret. It is understood that there are other permutation functions that are possible without departing from the scope of the present subject matter. Such time-based permutation functions, in certain examples, can significantly reduce the number of messages between a UE and the network. The next sections describe illustrative examples of systems for providing privacy protection for users of proximity-based services.
FIG. 2 illustrates an example method 200 of providing D2D discovery privacy using temporary IDs. Alice's UE is a subscriber of ProSe offered by operator A. Bob's UE is a subscriber of ProSe offered by operator B. David is also a subscriber of ProSe offered by operator B. Alice, Bob, and Dave use ProSe with different applications. They use different permanent IDs for these different applications. For example, Dave likes to play chess and he uses a ProSe enabled application called "chess-pal". He authorizes every user of chess- pal in proximity to discover him as potential chess player. His permanent
identity for this application is "dave72@chesspal.com". Alice, Bob, and Dave also belong to or are registered on a social website, such as Facebook. There permanent IDs are "alice@facebook.com", "bob@facebook.com", and
"dave@facebook.com". Alice and Bob are friends and they authorize each other to be discovered with their facebook identities whenever they are in proximity of each other. Alice and Dave are friends as well and so they authorize each other to be discovered with their facebook identities whenever they are in proximity of each other as well. Bob and Dave do not know each other very well and they have not authorized the other to discover them. If Dave' s permanent identity (dave@facebook.com) could be revealed by a discovery function, Bob could be able to discover and identify Dave even though he is not authorized to do so. If the permanent identity was bound to another permanent identity Bob would indeed not be able to discover Dave, but Alice would be able to discover him even after Dave might have revoked her authorization. Therefore, in certain examples, each permanent identity (e.g., facebook and chess-pal) can be allocated to a temporary ID. The IDs for this example are listed in the following table.
Subscriber Application Permanent ID Temporary ID
Alice Facebook alice@facebook.com SM-OJFXGUOIJCS3PKM5
Bob Facebook bob@facebook.com SM-D62321VQT8INCNMT
Dave Facebook david@facebook.com SM-
BPO74QJMTFEAK6H0
Dave Chess-pal david72@chesspal.com GA-9IPGPJB7E91703AW
In this example, the first two letters can signal the type of application. SM can indicate that the temporary ID is an ID for social media like Facebook or google+. GA can indicate that the temporary ID is an ID for gaming like chess- pal or WoW. Another example of temporary IDs could just replace the personal permanent part of the ID with an alias such as
OJFXGUOIJCS3PKM5 @facebook.com. In this case, the specific application can be indicated and the information that a user of this application is in proximity is revealed, but the identity of the user is still unknown. In another
example, a user setting can be used to determine which format to use for discovery.
In certain examples, D2D discovery can progress as follows:
All proximity service enabled UEs are sending their temporary IDs. At 201, Alice's UE is broadcasting "SM-OJFXGUOIJCS3PKM5". At 202, Bob's UE is broadcasting "SM-D62321VQT8INCNMT". Dave's UE is broadcasting "SM-BPO74QJMTFEAK6H0, GA-9IPGPJB7E91703AW". Dave is sending all the temporary Ids he wants to be discoverable with. If Alice and Bob are in proximity to each other, their UEs are receiving the beacons from the other UEs. Since the unknown temporary ID of Alice is an ID for social media, the ProSe enabled facebook application running on Bob's UE can transmit a request message at 203 requesting to resolve Alice's temporary ID. In certain examples, security can be in place (e.g. a digital signature) to ensure that the request is sent by an operator-authorized user and application. In some examples, the request can also contain a resolution number (e.g., 3456). At 204, Alice's UE can receive the request. In some examples, Alice can have her UE resolve her temporary ID without knowing who made the request. In some examples, at 205, Alice can try to identify the requestor before resolving or denying the resolution request. Such identification methods can include, but are not limited to, sending text messages asking who is at or near her location, looking around and trying to identify people she may know, such as her friend Bob, and then verifying that he sent the request including using the resolution number. If questioned, either online or offline, Bob can confirm he sent the request with the resolution number. In certain examples, Alice can authorize the resolution. At 206, Alice's UE can resolve her temporary ID, and at 207, Alice's UE can send her permanent ID to Bob's UE. In certain examples, the Alice's permanent ID can be sent using D2D communications. In some examples, the permanent ID information can be protected such as through encryption such that Alice's permanent ID remains confidential except to the application running on Bob's UE.
In certain examples, a similar method of authorization can take place if a social media application running on Bob's UE was discovered by Alice's UE. In certain examples, after cross authorization of Bob and Alice to each other's
social media applications, the allocation between permanent ID and temporary ID of Bob can be stored in Alice's UE. Likewise, the allocation between permanent ID and temporary ID of Alice can be stored in Bob's UE, such as at 208. As long as the temporary IDs keep the same, Bob and Alice can discover each other. As such, in the future, Alice's facebook application can prompt her whenever Bob's UE is in proximity and vice versa.
FIG. 3 illustrates generally a method 300 of providing privacy while employing proximity-base services that are assisted by a network resource or element. At 301 , the network can allocate temporary IDs including temporary IDs to Alice's and Bob's UEs. At 302, Alice's UE can broadcast discovery information including her social media temporary ID. At 303, Bob's UE can broadcast discovery information including his social media temporary ID. At 304, Bob's UE can request resolution of Alice's temporary ID from a network resource or entity. At 305, the network can check if Bob's UE is authorized to have Alice's temporary ID resolved. Alice may have previously authorization the network to resolve her temporary ID for Bob in response to a previous request or because Bob, or his temporary ID, is on a list Alice provided to the network that can allow the network to provide automatic resolution of Alice's temporary ID in response to a request from Bob's UE. At 306, if Bob is an authorized user of the application, and Alice has authorized Bob to discover her, the network can send Alice's permanent ID to Bob's UE. If Bob is not an authorized user of the application, the network can deny Bob's resolution request. In certain examples, if Bob is not an authorized by Alice to have Alice's temporary ID resolved, Alice can have the network deny Bob's resolution request. In some examples, if Bob is not an authorized by Alice to have Alice's temporary ID resolved, Alice can inquire online, such as through e- mail or text messaging, or offline, such as by looking around to learn the identity of Bob, and then authorize the network to resolve her temporary ID or deny Bob's resolution request.
At 307, Alice's UE can send a request to resolve Bob's temporary social media ID. At 308, the network can check whether Alice's UE is authorized to have Bob's social media temporary ID resolved. In certain examples, if the network can not find authorization for Alice' s request, the network can deny the
request or the network can prompt Bob via Bob's UE to accept or deny the request. At 309, once authorized, if not already, the network can send Bob's permanent ID to Alice's UE.
FIG. 4 illustrates generally a method 400 of providing privacy while employing proximity-base services that are assisted by a network resource or element. In certain examples, a network can allocate temporary IDs and can perform the resolution between temporary ID and permanent ID. In certain examples, such privacy functionality can be provided by a new network resource or entity that could be referred to as a ProSe-Server. In some examples, the privacy functionality could be implemented as a logical entity in an existing network element or resource. At 401, the network can allocate temporary IDs to the UEs of Alice and Dave. At 402, Alice can authorized the network to resolve her temporary ID for Dave's UE when the UEs are in proximity to each other. In certain examples, at 403, the authorization can be stored on a network resource or entity. At 404, Alice and Dave split up, and at 405, Alice can revoke her authorization of Dave to discover her proximity. At 406, in certain examples, the authorization can be deleted from the network. At 407, Alice's temporary ID can be changed or replaced by the network in response to the revocation of authorization. At 408, if Dave's UE is receiving the new unknown temporary ID, it is not able to resolve it and to recognize Alice. At 409, Dave's UE could transmit a request to resolve the temporary ID. At 410, the network can check for an authorization, and because no authorization exists, the network, at 411, can deny the request. In some examples, the network may provide a notification to Alice's UE indicating a request for resolution of her temporary ID and allow Alice to decide whether to authorize the resolution or deny the request.
In certain examples, and in reference to FIGS. 3 and 4, if Bob's UE receives Alice's new or replacement temporary ID, a request sent from Bob's UE to Alice's UE can be authorized since a request from Bob's UE is still authorized by Alice. In certain examples, a request from bob's UE to Alice's UE can be resolved without interaction on Alice's part. In some examples, Alice's new or replacement temporary ID could be sent to previously authorized UEs such that Alice's discovery information can be recognized by the authorized UEs. The new temporary ID can be sent to the authorized UEs via the network,
via D2D communication, or via combinations of network communications and D2D communications.
FIG. 5 is a block diagram illustrating an example mobile device 500, upon which any one or more of the techniques (e.g., methodologies) discussed herein may be performed. The mobile device 500 may include a processor 510. The processor 510 may be any of a variety of different types of commercially available processors suitable for mobile devices, for example, an XScale architecture microprocessor, a Microprocessor without Interlocked Pipeline Stages (MIPS) architecture processor, or another type of processor. A memory 520, such as a Random Access Memory (RAM), a Flash memory, or other type of memory, is typically accessible to the processor 510. The memory 520 may be adapted to store an operating system (OS) 530, as well as application programs 540. The OS 530 or application programs 540 may include instructions stored on a computer readable medium (e.g., memory 520) that may cause the processor 510 of the mobile device 500 to perform any one or more of the techniques discussed herein. The processor 510 may be coupled, either directly or via appropriate intermediary hardware, to a display 550 and to one or more input/output (I/O) devices 560, such as a keypad, a touch panel sensor, a microphone, etc. Similarly, in an example embodiment, the processor 510 may be coupled to a transceiver 570 that interfaces with an antenna 590. The transceiver 570 may be configured to both transmit and receive cellular network signals, wireless data signals, or other types of signals via the antenna 590, depending on the nature of the mobile device 500. Further, in some
configurations, a GPS receiver 580 may also make use of the antenna 590 to receive GPS signals.
FIG. 6 illustrates a block diagram of an example machine 600 upon which any one or more of the techniques (e.g., methodologies) discussed herein may be performed. In alternative embodiments, the machine 600 may operate as a standalone device or may be connected (e.g., networked) to other machines. In a networked deployment, the machine 600 may operate in the capacity of a server machine, a client machine, or both in server-client network environments. In an example, the machine 600 may act as a peer machine in peer-to-peer (P2P) (or other distributed) network environment. The machine 600 may be a personal
computer (PC), a tablet PC, a Personal Digital Assistant (PDA), a mobile telephone, a web appliance, or any machine capable of executing instructions (sequential or otherwise) that specify actions to be taken by that machine.
Further, while only a single machine is illustrated, the term "machine" shall also be taken to include any collection of machines that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein, such as cloud computing, software as a service (SaaS), other computer cluster configurations.
Examples, as described herein, may include, or may operate on, logic or a number of components, modules, or mechanisms. Modules are tangible entities capable of performing specified operations and may be configured or arranged in a certain manner. In an example, circuits may be arranged (e.g., internally or with respect to external entities such as other circuits) in a specified manner as a module. In an example, the whole or part of one or more computer systems (e.g., a standalone, client or server computer system) or one or more hardware processors may be configured by firmware or software (e.g., instructions, an application portion, or an application) as a module that operates to perform specified operations. In an example, the software may reside (1) on a non-transitory machine-readable medium or (2) in a transmission signal. In an example, the software, when executed by the underlying hardware of the module, causes the hardware to perform the specified operations.
Accordingly, the term "module" is understood to encompass a tangible entity, be that an entity that is physically constructed, specifically configured (e.g., hardwired), or temporarily (e.g., transitorily) configured (e.g.,
programmed) to operate in a specified manner or to perform part or all of any operation described herein. Considering examples in which modules are temporarily configured, each of the modules need not be instantiated at any one moment in time. For example, where the modules comprise a general-purpose hardware processor configured using software, the general-purpose hardware processor may be configured as respective different modules at different times. Software may accordingly configure a hardware processor, for example, to constitute a particular module at one instance of time and to constitute a different module at a different instance of time.
Machine (e.g., computer system) 600 may include a hardware processor 602 (e.g., a processing unit, a graphics processing unit (GPU), a hardware processor core, or any combination thereof), a main memory 604, and a static memory 606, some or all of which may communicate with each other via a link 608 (e.g., a bus, link, interconnect, or the like). The machine 600 may further include a display device 610, an input device 612 (e.g., a keyboard), and a user interface (UI) navigation device 614 (e.g., a mouse). In an example, the display device 610, input device 612, and UI navigation device 614 may be a touch screen display. The machine 600 may additionally include a mass storage (e.g., drive unit) 616, a signal generation device 618 (e.g., a speaker), a network interface device 620, and one or more sensors 621, such as a global positioning system (GPS) sensor, camera, video recorder, compass, accelerometer, or other sensor. The machine 600 may include an output controller 628, such as a serial (e.g., universal serial bus (USB), parallel, or other wired or wireless (e.g., infrared (I )) connection to communicate or control one or more peripheral devices (e.g., a printer, card reader, etc.).
The mass storage 616 may include a machine -readable medium 622 on which is stored one or more sets of data structures or instructions 624 (e.g., software) embodying or utilized by any one or more of the techniques or functions described herein. The instructions 624 may also reside, completely or at least partially, within the main memory 604, within static memory 606, or within the hardware processor 602 during execution thereof by the machine 600. In an example, one or any combination of the hardware processor 602, the main memory 604, the static memory 606, or the mass storage 616 may constitute machine-readable media.
While the machine -readable medium 622 is illustrated as a single medium, the term "machine readable medium" may include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that configured to store the one or more instructions 624.
The term "machine-readable medium" may include any tangible medium that is capable of storing, encoding, or carrying instructions for execution by the machine 600 and that cause the machine 600 to perform any one or more of the techniques of the present disclosure, or that is capable of storing, encoding or
carrying data structures used by or associated with such instructions. Non- limiting machine -readable medium examples may include solid-state memories, and optical and magnetic media. Specific examples of machine-readable media may include: non- volatile memory, such as semiconductor memory devices (e.g., Electrically Programmable Read-Only Memory (EPROM), Electrically Erasable Programmable Read-Only Memory (EEPROM)) and flash memory devices; magnetic disks, such as internal hard disks and removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks.
The instructions 624 may further be transmitted or received over a communications network 626 using a transmission medium via the network interface device 620 utilizing any one of a number of transfer protocols (e.g., frame relay, internet protocol (IP), transmission control protocol (TCP), user datagram protocol (UDP), hypertext transfer protocol (HTTP), etc.). The term "transmission medium" shall be taken to include any intangible medium that is capable of storing, encoding or carrying instructions for execution by the machine 600, and includes digital or analog communications signals or other intangible medium to facilitate communication of such software.
Embodiments may be implemented in one or a combination of hardware, firmware and software. Embodiments may also be implemented as instructions stored on a computer-readable storage device, which may be read and executed by at least one processor to perform the operations described herein. A computer-readable storage device may include any non-transitory mechanism for storing information in a form readable by a machine (e.g., a computer). For example, a computer-readable storage device may include read-only memory (ROM), random-access memory (RAM), magnetic disk storage media, optical storage media, flash-memory devices, and other storage devices and media.
FIG. 7 illustrates a functional block diagram of an example machine 700 (e.g., a UE) in accordance with some embodiments. The UE 700 may include physical layer circuitry 702 for transmitting and receiving signals to and from eNBs using one or more antennas 701. UE 700 may also include processing circuitry 706 that may include, among other things a channel estimator. UE 700 may also include a memory 708. The processing circuitry may be configured to determine several different feedback values discussed below for transmission to
the eNB. The processing circuitry may also include a media access control (MAC) layer 704.
In some embodiments, the UE 700 may include one or more of a keyboard, a display, a non-volatile memory port, multiple antennas, a graphics processor, an application processor, speakers, and other mobile device elements. The display may be an LCD screen including a touch screen.
The one or more antennas 701 utilized by the UE 700 may comprise one or more directional or omnidirectional antennas, including, for example, dipole antennas, monopole antennas, patch antennas, loop antennas, microstrip antennas or other types of antennas suitable for transmission of RF signals. In some embodiments, instead of two or more antennas, a single antenna with multiple apertures may be used. In these embodiments, each aperture may be considered a separate antenna. In some multiple- input multiple-output (MIMO) embodiments, the antennas may be effectively separated to take advantage of spatial diversity and the different channel characteristics that may result between each of antennas and the antennas of a transmitting station. In some MIMO embodiments, the antennas may be separated by up to 1/10 of a wavelength or more.
Although the UE 700 is illustrated as having several separate functional elements, one or more of the functional elements may be combined and may be implemented by combinations of software-configured elements, such as processing elements including digital signal processors (DSPs), and/or other hardware elements. For example, some elements may comprise one or more microprocessors, DSPs, application specific integrated circuits (ASICs), radio- frequency integrated circuits (RFICs) and combinations of various hardware and logic circuitry for performing at least the functions described herein. In some embodiments, the functional elements may refer to one or more processes operating on one or more processing elements.
Embodiments may be implemented in one or a combination of hardware, firmware and software. Embodiments may also be implemented as instructions stored on a computer-readable storage medium, which may be read and executed by at least one processor to perform the operations described herein. A computer-readable storage medium may include any non-transitory mechanism
for storing information in a form readable by a machine (e.g., a computer). For example, a computer-readable storage medium may include read-only memory (ROM), random-access memory (RAM), magnetic disk storage media, optical storage media, flash-memory devices, and other storage devices and media. In these embodiments, one or more processors of the UE 700 may be configured with the instructions to perform the operations described herein.
In some embodiments, the UE 700 may be configured to receive OFDM communication signals over a multicarrier communication channel in accordance with an OFDMA communication technique. The OFDM signals may comprise a plurality of orthogonal subcarriers. In some broadband multicarrier embodiments, eNBs (including macro eNB and pico eNBs) may be part of a broadband wireless access (BWA) network communication network, such as a Worldwide Interoperability for Microwave Access (WiMAX) communication network or a 3rd Generation Partnership Project (3GPP) Universal Terrestrial Radio Access Network (UTRAN) Long-Term-Evolution (LTE) or a Long-Term- Evolution (LTE) communication network, although the scope of the inventive subject matter described herein is not limited in this respect. In these broadband multicarrier embodiments, the UE 700 and the eNBs may be configured to communicate in accordance with an orthogonal frequency division multiple access (OFDMA) technique. The UTRAN LTE standards include the 3rd
Generation Partnership Project (3GPP) standards for UTRAN-LTE, release 8, March 2008, and release 10, December 2010, including variations and evolutions thereof.
In some LTE embodiments, the basic unit of the wireless resource is the Physical Resource Block (PRB). The PRB may comprise 12 sub-carriers in the frequency domain x 0.5 ms in the time domain. The PRBs may be allocated in pairs (in the time domain). In these embodiments, the PRB may comprise a plurality of resource elements (REs). A RE may comprise one sub-carrier x one symbol.
Two types of reference signals may be transmitted by an eNB including demodulation reference signals (DM-RS), channel state information reference signals (CIS-RS) and/or a common reference signal (CRS). The DM-RS may be
used by the UE for data demodulation. The reference signals may be transmitted in predetermined PRBs.
In some embodiments, the OFDMA technique may be either a frequency domain duplexing (FDD) technique that uses different uplink and downlink spectrum or a time-domain duplexing (TDD) technique that uses the same spectrum for uplink and downlink.
In some other embodiments, the UE 700 and the eNBs may be configured to communicate signals that were transmitted using one or more other modulation techniques such as spread spectrum modulation (e.g., direct sequence code division multiple access (DS-CDMA) and/or frequency hopping code division multiple access (FH-CDMA)), time-division multiplexing (TDM) modulation, and/or frequency-division multiplexing (FDM) modulation, although the scope of the embodiments is not limited in this respect.
In some embodiments, the UE 700 may be part of a portable wireless communication device, such as a PDA, a laptop or portable computer with wireless communication capability, a web tablet, a wireless telephone, a wireless headset, a pager, an instant messaging device, a digital camera, an access point, a television, a medical device (e.g., a heart rate monitor, a blood pressure monitor, etc.), or other device that may receive and/or transmit information wirelessly.
In some LTE embodiments, the UE 700 may calculate several different feedback values which may be used to perform channel adaption for closed-loop spatial multiplexing transmission mode. These feedback values may include a channel-quality indicator (CQI), a rank indicator (RI) and a precoding matrix indicator (PMI). By the CQI, the transmitter selects one of several modulation alphabets and code rate combinations. The RI informs the transmitter about the number of useful transmission layers for the current MIMO channel, and the PMI indicates the codebook index of the precoding matrix (depending on the number of transmit antennas) that is applied at the transmitter. The code rate used by the eNB may be based on the CQI. The PMI may be a vector that is calculated by the UE and reported to the eNB. In some embodiments, the UE may transmit a physical uplink control channel (PUCCH) of format 2, 2a or 2b containing the CQI/PMI or RI.
In these embodiments, the CQI may be an indication of the downlink mobile radio channel quality as experienced by the UE 700. The CQI allows the UE 700 to propose to an eNB an optimum modulation scheme and coding rate to use for a given radio link quality so that the resulting transport block error rate would not exceed a certain value, such as 10%. In some embodiments, the UE may report a wideband CQI value which refers to the channel quality of the system bandwidth. The UE may also report a sub-band CQI value per sub-band of a certain number of resource blocks which may be configured by higher layers. The full set of sub-bands may cover the system bandwidth. In case of spatial multiplexing, a CQI per code word may be reported.
In some embodiments, the PMI may indicate an optimum precoding matrix to be used by the eNB for a given radio condition. The PMI value refers to the codebook table. The network configures the number of resource blocks that are represented by a PMI report. In some embodiments, to cover the system bandwidth, multiple PMI reports may be provided. PMI reports may also be provided for closed loop spatial multiplexing, multi-user MIMO and closed-loop rank 1 precoding MIMO modes.
In some cooperating multipoint (CoMP) embodiments, the network may be configured for joint transmissions to a UE in which two or more
cooperating/coordinating points, such as remote-radio heads (RRHs) transmit jointly. In these embodiments, the joint transmissions may be MIMO transmissions and the cooperating points are configured to perform joint beamforming.
The example embodiments discussed herein may be utilized by wireless network access providers of all types including, but not limited to, mobile broadband providers looking to increase cellular offload ratios for cost- avoidance and performance gains, fixed broadband providers looking to extend their coverage footprint outside of customers' homes or businesses, wireless network access providers looking to monetize access networks via access consumers or venue owners, public venues looking to provide wireless network (e.g., Internet) access, or digital services (e.g. location services, advertisements, entertainment, etc.) over a wireless network, and business, educational or non-
profit enterprises that desire to simplify guest Internet access or Bring- Your- Own-Device (BYOD) access.
ADDITIONAL NOTES
The above detailed description includes references to the accompanying drawings, which form a part of the detailed description. The drawings show, by way of illustration, specific embodiments in which the invention can be practiced. These embodiments are also referred to herein as "examples." All publications, patents, and patent documents referred to in this document are incorporated by reference herein in their entirety, as though individually incorporated by reference. In the event of inconsistent usages between this document and those documents so incorporated by reference, the usage in the incorporated reference(s) should be considered supplementary to that of this document; for irreconcilable inconsistencies, the usage in this document controls.
In this document, the terms "a" or "an" are used, as is common in patent documents, to include one or more than one, independent of any other instances or usages of "at least one" or "one or more." In this document, the term "or" is used to refer to a nonexclusive or, such that "A or B" includes "A but not B," "B but not A," and "A and B," unless otherwise indicated. In the appended claims, the terms "including" and "in which" are used as the plain-English equivalents of the respective terms "comprising" and "wherein." Also, in the following claims, the terms "including" and "comprising" are open-ended, that is, a system, device, article, or process that includes elements in addition to those listed after such a term in a claim are still deemed to fall within the scope of that claim. Moreover, in the following claims, the terms "first," "second," and "third," etc. are used merely as labels, and are not intended to impose numerical requirements on their objects.
The above description is intended to be illustrative, and not restrictive. For example, the above-described examples (or one or more aspects thereof) may be used in combination with each other. Other embodiments can be used, such as by one of ordinary skill in the art upon reviewing the above description. Also, in the above Detailed Description, various features may be grouped
together to streamline the disclosure. This should not be interpreted as intending that an unclaimed disclosed feature is essential to any claim. Rather, inventive subject matter may lie in less than all features of a particular disclosed embodiment. Thus, the following claims are hereby incorporated into the Detailed Description, with each claim standing on its own as a separate embodiment. The scope of the invention should be determined with reference to the appended claims, along with the full scope of equivalents to which such claims are entitled.
Claims
1. A method for protecting a user identity for device-to-device
communication enabled user equipment, the method comprising:
transmitting a first temporary identification and first discovery information from a first user equipment (UE), the discovery information authorizing discovery of the first UE; and
receiving a request from a second UE to join a device-to-device network with the first UE using a second temporary identification associated with the second UE.
2. The method of claim 1, wherein the request includes an indication that the request is responsive to the discovery information.
3. The method of claim 1 , including resolving the first temporary address to provide a permanent ID associated with the first UE using previously stored resolution information associated with the permanent ID of the first UE and the first temporary ID.
4. The method of claim 3, including transmitting the permanent ID of the first UE to the second UE.
5. The method of claim 4, wherein transmitting the permanent ID of the first UE includes re-transmitting an indication received with the request, wherein the indication indicates that the request was responsive to the discovery information.
6. The method of claim 3, wherein the resolving the second temporary ID includes resolving the second temporary ID at the first UE to provide a permanent ID associated with the second UE using previously stored resolution information associated with the permanent ID of the second UE and the second temporary ID.
7. The method of claim 3, wherein the resolving the first temporary ID includes resolving the first temporary ID at a network resource to provide a permanent ID associated with the first UE using previously stored resolution information associated with the permanent ID of the first UE and the first temporary ID.
8. The method of claim 3, wherein the resolving includes verifying that the second UE is a previously authorized UE.
9. The method of claim 1 , including saving identification information for one or more authorized UEs associated with the first UE on memory of the first UE.
10. The method of claim 9, including associating a new temporary ID with each authorized UE of the one or more authorized UEs.
11. The method of claim 10, periodically replacing the new temporary ID for one of the one or more authorized UEs with a replacement temporary ID.
12. The method of claim 11, wherein periodically replacing the new temporary ID includes receiving the replacement ID from a network resource.
13. The method of claim 1, including periodically replacing the first temporary ID with a first replacement temporary ID.
14. The method of claim 13, wherein periodically replacing the first temporary ID includes receiving the first replacement ID from a network resource.
15. The method of claim 13, wherein periodically replacing the first temporary ID includes generating the first replacement ID at the first UE using a permutation algorithm simultaneously with generating the replacement ID at a network resource using the permutation algorithm.
16. The method of claim 1, wherein the discovery information is generated from an application configured to run on the firs UE.
17. The method of claim 1, wherein the discovery information is generated from a social media application configured to run on the first UE.
18. The method of claim 1, wherein the discovery information is generated from a gaming application configured to run on the first UE.
19. A method for protecting a user identity for device-to-device (D2D) communication enabled user equipment (UE), the method comprising:
receiving a first temporary identification and first discovery information from a first UE at a second UE; and
transmitting a request, from the second UE, to the first UE to join a device-to-device network, wherein the request includes a second temporary identification associated with the second UE.
20. The method of claim 19, wherein transmitting includes:
associating the first temporary ID with a previously stored permanent ID of a first authorized UE; and
wherein the request includes a permanent ID of the second UE.
21. The method of claim 19, including receiving, in response to the request, a permanent ID of the first UE.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP14804124.7A EP3005758B1 (en) | 2013-05-31 | 2014-05-23 | Proximity-based services discovery privacy |
CN201480024584.4A CN105165042B (en) | 2013-05-31 | 2014-05-23 | Proximity service discovery privacy |
HK16105779.8A HK1217857A1 (en) | 2013-05-31 | 2016-05-20 | Proximity-based services discovery privacy |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201361829968P | 2013-05-31 | 2013-05-31 | |
US61/829,968 | 2013-05-31 | ||
US14/141,843 US9559761B2 (en) | 2013-05-31 | 2013-12-27 | Proximity-based services discovery privacy |
US14/141,843 | 2013-12-27 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2014193749A1 true WO2014193749A1 (en) | 2014-12-04 |
Family
ID=51985096
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2013/074747 WO2014193475A1 (en) | 2013-05-31 | 2013-12-12 | Hybrid digital and analog beamforming for large antenna arrays |
PCT/US2014/039072 WO2014193718A1 (en) | 2013-05-31 | 2014-05-22 | User equipment and methods for codebook subsampling for enhanced 4tx codebooks |
PCT/US2014/039116 WO2014193723A1 (en) | 2013-05-31 | 2014-05-22 | Reduction of user plane congestion |
PCT/US2014/039313 WO2014193749A1 (en) | 2013-05-31 | 2014-05-23 | Proximity-based services discovery privacy |
Family Applications Before (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2013/074747 WO2014193475A1 (en) | 2013-05-31 | 2013-12-12 | Hybrid digital and analog beamforming for large antenna arrays |
PCT/US2014/039072 WO2014193718A1 (en) | 2013-05-31 | 2014-05-22 | User equipment and methods for codebook subsampling for enhanced 4tx codebooks |
PCT/US2014/039116 WO2014193723A1 (en) | 2013-05-31 | 2014-05-22 | Reduction of user plane congestion |
Country Status (8)
Country | Link |
---|---|
US (6) | US9647735B2 (en) |
EP (5) | EP3267720B1 (en) |
CN (5) | CN105144600B (en) |
ES (1) | ES2689020T3 (en) |
HK (5) | HK1217857A1 (en) |
HU (1) | HUE039774T2 (en) |
TW (1) | TWI556658B (en) |
WO (4) | WO2014193475A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9071297B2 (en) | 2013-05-31 | 2015-06-30 | Intel IP Corporation | User equipment and methods for codebook subsampling for enhanced 4TX codebooks |
CN107409344A (en) * | 2015-03-17 | 2017-11-28 | 诺基亚技术有限公司 | Wireless routing |
Families Citing this family (143)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10425135B2 (en) * | 2001-04-26 | 2019-09-24 | Genghiscomm Holdings, LLC | Coordinated multipoint systems |
KR101817724B1 (en) * | 2010-04-30 | 2018-02-21 | 삼성전자주식회사 | Multiple input multiple output communication system using codebook corresopding to each reporting mode |
KR20130127347A (en) * | 2012-05-10 | 2013-11-22 | 삼성전자주식회사 | Method and apparatus for communication on analog and digital hybrid beam-forming |
US9344167B2 (en) * | 2013-06-06 | 2016-05-17 | Broadcom Corporation | Codebook subsampling for multi-antenna transmit precoder codebook |
US9432101B2 (en) | 2013-06-07 | 2016-08-30 | Google Technology Holdings LLC | Methods for codebook sub-sampling |
WO2014208032A1 (en) * | 2013-06-28 | 2014-12-31 | Nec Corporation | Secure system and method of making secure communication |
CN108990063A (en) * | 2013-06-28 | 2018-12-11 | 日本电气株式会社 | Communication system, network and user equipment and its communication means |
US20150036621A1 (en) * | 2013-07-31 | 2015-02-05 | Electronics And Telecommunications Research Institute | Method for providing interference information in mobile communication system |
US9326122B2 (en) | 2013-08-08 | 2016-04-26 | Intel IP Corporation | User equipment and method for packet based device-to-device (D2D) discovery in an LTE network |
US9762306B2 (en) * | 2013-08-08 | 2017-09-12 | Intel IP Corporation | Method, apparatus and system for electrical downtilt adjustment in a multiple input multiple output system |
KR102083322B1 (en) * | 2013-08-22 | 2020-03-03 | 삼성전자주식회사 | Apparatus and method for providing service to isolated user equipment in device-to-device communication system |
KR102039535B1 (en) * | 2013-10-22 | 2019-11-01 | 삼성전자 주식회사 | Method and apparatus for allocating radio resource |
EP3068060A4 (en) * | 2013-11-04 | 2017-11-01 | LG Electronics Inc. | Method and apparatus for transmitting signal in wireless communication system |
KR101792517B1 (en) * | 2013-11-04 | 2017-11-02 | 엘지전자 주식회사 | Pre-compensation of the phase shifting error |
KR102323130B1 (en) * | 2013-11-27 | 2021-11-10 | 삼성전자 주식회사 | Method and apparatus for open-loop mimo transmission in beamforming system |
KR20150073825A (en) * | 2013-12-20 | 2015-07-01 | 삼성전자주식회사 | Method and apparatus for reducing voice call setup time in mobile communication network |
WO2015120902A1 (en) * | 2014-02-14 | 2015-08-20 | Telefonaktiebolaget L M Ericsson (Publ) | Pcrf assisted apn selection |
KR102171797B1 (en) * | 2014-02-28 | 2020-10-29 | 삼성전자주식회사 | Method and apparatus for generating non-gaussian inteference channels in wireless communication system |
KR101846832B1 (en) * | 2014-04-02 | 2018-04-09 | 후아웨이 테크놀러지 컴퍼니 리미티드 | Beamforming based communications method and apparatus |
US20160342979A1 (en) * | 2014-04-08 | 2016-11-24 | Capital One Services, Llc | Systems and methods for transaction authentication using dynamic wireless beacon devices |
KR101977005B1 (en) | 2014-06-28 | 2019-05-10 | 텔레폰악티에볼라겟엘엠에릭슨(펍) | Obtaining authorization to use proximity services in a mobile communication system |
US20150382289A1 (en) * | 2014-06-28 | 2015-12-31 | Telefonaktiebolaget L M Ericsson (Publ) | Obtaining Authorization to Use Proximity Services in a Mobile Communication System |
US9681309B2 (en) * | 2014-08-05 | 2017-06-13 | Qualcomm Incorporated | Methods exploiting asymmetric capabilities for contention-based random access in mm-wave access systems |
US9648591B2 (en) * | 2014-08-12 | 2017-05-09 | Amazon Technologies, Inc. | Avoiding radio access network congestion |
US9706519B2 (en) * | 2014-10-03 | 2017-07-11 | Daniel Ursitti | System and method for establishing a user connection |
US10231111B2 (en) * | 2014-10-03 | 2019-03-12 | Daniel Ursitti | System and method for establishing a user connection |
US10694496B2 (en) | 2014-11-07 | 2020-06-23 | Samsung Electronics Co., Ltd. | Method and apparatus for transmitting group message to user equipment (UE) |
JP6536159B2 (en) * | 2014-11-20 | 2019-07-03 | 住友電気工業株式会社 | Wireless communication apparatus and method of determining weight matrix |
US10211891B2 (en) * | 2014-11-21 | 2019-02-19 | Futurewei Technologies, Inc. | System and method for multi-user multiple input multiple output communications |
US10560163B2 (en) * | 2014-12-19 | 2020-02-11 | Telefonaktiebolaget Lm Ericsson (Publ) | Beamforming configuration with adaptive port-to-antenna mapping for a multi-antenna system |
CN107210811B (en) | 2015-01-16 | 2021-05-11 | 梁平 | Method for distributed massive MIMO (DM-MIMO) |
CN106033989B (en) * | 2015-03-12 | 2019-09-17 | 电信科学技术研究院 | A kind of mixed-beam figuration transmission method and the network equipment |
CN106033986B (en) | 2015-03-19 | 2020-02-04 | 电信科学技术研究院 | Large-scale digital-analog hybrid antenna and channel state information feedback method and device |
WO2016152916A1 (en) * | 2015-03-26 | 2016-09-29 | 株式会社Nttドコモ | Radio communication control method and radio communication system |
US9794036B2 (en) * | 2015-03-26 | 2017-10-17 | Facebook, Inc. | Optimizations for zero-forcing precoding |
CN111147622A (en) * | 2015-05-18 | 2020-05-12 | 华为技术有限公司 | IP address allocation method in D2D communication and user equipment |
WO2016206052A1 (en) * | 2015-06-25 | 2016-12-29 | Intel IP Corporation | User equipment and codebook search method for 4tx dual codebook (ran1) |
CN107615845B (en) * | 2015-06-30 | 2020-04-14 | 华为技术有限公司 | Method, device and computer storage medium for transmitting uplink data |
US10117127B2 (en) * | 2015-07-08 | 2018-10-30 | Oracle International Corporation | Methods, systems, and computer readable media for communicating radio access network congestion status information for large numbers of users |
WO2017014612A1 (en) | 2015-07-23 | 2017-01-26 | 엘지전자(주) | Codebook-based signal transmission/reception method in multi-antenna wireless communication system, and device for same |
US10051003B2 (en) * | 2015-07-30 | 2018-08-14 | Apple Inc. | Privacy enhancements for wireless devices |
US10110290B2 (en) | 2015-08-13 | 2018-10-23 | Electronics And Telecommunications Research Institute | Terminal for periodically transmitting CSI feedback information |
WO2017030429A1 (en) * | 2015-08-20 | 2017-02-23 | 삼성전자 주식회사 | Channel state information feedback method and device in wireless communication system |
US9986458B2 (en) * | 2015-08-27 | 2018-05-29 | Qualcomm Incorporated | Mitigating constrained backhaul availability between a radio access network (RAN) and core network |
WO2017062050A1 (en) * | 2015-10-07 | 2017-04-13 | Intel IP Corporation | Dynamically beamformed control channel for beamformed cells |
US10374836B2 (en) * | 2015-10-28 | 2019-08-06 | Huawei Technologies Canada Co., Ltd. | Method and apparatus for downlink channel estimation in massive MIMO |
US11419110B2 (en) * | 2015-11-03 | 2022-08-16 | Apple Inc. | Short transmission time interval (TTI) |
US10484060B2 (en) * | 2015-11-18 | 2019-11-19 | Samsung Electronics Co., Ltd | Method and device for transmitting and receiving channel state information in mobile communication system |
WO2017088896A1 (en) * | 2015-11-23 | 2017-06-01 | Telefonaktiebolaget Lm Ericsson (Publ) | Antenna system configuration |
US10904040B2 (en) * | 2015-11-26 | 2021-01-26 | Nokia Solutions And Networks Oy | Channel estimation in communications |
WO2017118468A1 (en) * | 2016-01-04 | 2017-07-13 | Telefonaktiebolaget Lm Ericsson (Publ) | Signal processing for active antenna array |
CN108713295B (en) * | 2016-01-13 | 2021-07-06 | 瑞典爱立信有限公司 | Practical hybrid precoding scheme for multi-user massive MIMO systems |
ES2898523T3 (en) * | 2016-01-29 | 2022-03-07 | Ericsson Telefon Ab L M | Beamforming using an antenna array |
CN108604919B (en) * | 2016-02-05 | 2022-04-08 | 索尼公司 | Terminal device, infrastructure equipment, method and integrated circuit |
KR102429965B1 (en) * | 2016-02-19 | 2022-08-08 | 삼성전자주식회사 | Method and Apparatus for Selecting Rx Antenna Set |
CN108781105B (en) * | 2016-02-24 | 2022-04-15 | 三星电子株式会社 | Method and apparatus for Channel State Information (CSI) reporting |
US10056956B2 (en) * | 2016-03-24 | 2018-08-21 | Samsung Electronics Co., Ltd. | Precoder codebook for CSI reporting in advanced wireless communication systems |
WO2017166259A1 (en) * | 2016-04-01 | 2017-10-05 | Intel IP Corporation | Beamforming architecture for multi-beam multiple-input-multiple-output (mimo) |
US10142957B2 (en) * | 2016-04-06 | 2018-11-27 | Sharp Kabushiki Kaisha | Resource selection for vehicle (V2X) communications |
WO2017180485A1 (en) * | 2016-04-11 | 2017-10-19 | Ping Liang | A hybrid beamforming method for wireless multi-antenna and frequency-division duplex systems |
US10270497B2 (en) * | 2016-04-19 | 2019-04-23 | Maxlinear Asia Singapore PTE LTD | Modular and scalable circuit architecture for massive MIMO applications |
US11178646B2 (en) | 2016-04-19 | 2021-11-16 | Qualcomm Incorporated | Beam reference signal based narrowband channel measurement and CQI reporting |
CN107306148B (en) * | 2016-04-22 | 2021-03-16 | 中国移动通信有限公司研究院 | Signal processing method, base station and terminal under digital-analog domain hybrid architecture |
US10469516B2 (en) * | 2016-04-28 | 2019-11-05 | Qualcomm Incorporated | Techniques for associating measurement data acquired at a wireless communication device with current values of time and location obtained by a user equipment and acknowledged by the wireless communication device |
WO2017197189A1 (en) * | 2016-05-12 | 2017-11-16 | Interdigital Patent Holdings, Inc. | Systems and methods for single user hybrid mimo for mmwave wireless networks |
EP4033676A1 (en) * | 2016-05-12 | 2022-07-27 | Interdigital Patent Holdings, Inc. | Systems and methods for beamforming feedback in mmwave wireless local area networks |
CN107396443B (en) * | 2016-05-13 | 2022-07-12 | 中兴通讯股份有限公司 | Control information sending method, detection method, base station and terminal |
CN107370524A (en) * | 2016-05-13 | 2017-11-21 | 电信科学技术研究院 | A kind of signaling method, device and equipment |
CN107370534A (en) * | 2016-05-13 | 2017-11-21 | 中兴通讯股份有限公司 | The measuring method and device of channel condition information |
US10141993B2 (en) * | 2016-06-16 | 2018-11-27 | Intel Corporation | Modular antenna array beam forming |
EP3264598B1 (en) | 2016-07-01 | 2019-10-09 | Nokia Solutions and Networks Oy | Improved feedback in miso systems |
CN107645780B (en) * | 2016-07-22 | 2021-05-04 | 华硕电脑股份有限公司 | Transmitting or receiving method and apparatus using beamforming in wireless communication system |
WO2018029646A1 (en) | 2016-08-12 | 2018-02-15 | Telefonaktiebolaget Lm Ericsson (Publ) | Layer 1 and layer 2 channel state information rich reporting mechanisms |
JP7003111B2 (en) | 2016-08-12 | 2022-01-20 | テレフオンアクチーボラゲット エルエム エリクソン(パブル) | Configurable codebook for advanced CSI feedback overhead reduction |
CN107733485B (en) * | 2016-08-12 | 2021-09-03 | 中兴通讯股份有限公司 | Feedback method and device of channel state information |
KR102376307B1 (en) | 2016-08-12 | 2022-04-01 | 텔레호낙티에볼라게트 엘엠 에릭슨(피유비엘) | Multi-beam codebooks with further optimized overhead |
US9997844B2 (en) | 2016-08-15 | 2018-06-12 | Microsoft Technology Licensing, Llc | Contactless millimeter wave coupler, an electronic apparatus and a connector cable |
US10476781B2 (en) | 2016-08-22 | 2019-11-12 | Qualcomm Incorporated | Feedback for independent links |
CN109661784B (en) * | 2016-08-25 | 2022-02-25 | 云雀无线控股有限责任公司 | Efficient channel estimation for implicit MU-MIMO |
WO2018048333A1 (en) | 2016-09-06 | 2018-03-15 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods and devices for determination of beamforming information |
CN109906565B (en) * | 2016-09-08 | 2022-06-14 | 交互数字专利控股公司 | Multi-channel transmission in MMW WLAN systems |
CN107872294A (en) * | 2016-09-28 | 2018-04-03 | 北京信威通信技术股份有限公司 | A kind of periodic report CSI method |
CA3038830C (en) | 2016-09-29 | 2021-05-04 | Huawei Technologies Co., Ltd. | Method and apparatus for transmitting channel state information |
CN107888249A (en) * | 2016-09-30 | 2018-04-06 | 北京信威通信技术股份有限公司 | The method and device that a kind of Beam Domain reference signal is sent |
EP3520168A4 (en) | 2016-09-30 | 2020-07-01 | Jeffrey Freedman | Providing communications coverage using hybrid analog/digital beamforming |
CN109644025B9 (en) * | 2016-10-03 | 2021-11-05 | 诺基亚技术有限公司 | Reference signal with beamforming training and channel estimation |
US9967014B1 (en) * | 2016-11-09 | 2018-05-08 | Facebook, Inc. | Beamforming in antenna systems |
US10154496B2 (en) | 2016-11-10 | 2018-12-11 | Futurewei Technologies, Inc. | System and method for beamformed reference signals in three dimensional multiple input multiple output communications systems |
US11063795B2 (en) | 2016-11-16 | 2021-07-13 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods and devices for adapting load on a fronthaul network |
EP3327949A1 (en) * | 2016-11-25 | 2018-05-30 | Alcatel Lucent | Mimo precoding |
WO2018139963A1 (en) * | 2017-01-24 | 2018-08-02 | Telefonaktiebolaget Lm Ericsson (Publ) | Managing of channel state information in a multiple-antenna communication system |
US10404433B2 (en) * | 2017-01-31 | 2019-09-03 | Qualcomm Incorporated | Matrix-based techniques for mapping resource elements to ports for reference signals |
WO2018145062A2 (en) * | 2017-02-06 | 2018-08-09 | Altiostar Networks, Inc. | Multi-site mimo communications system with hybrid beamforming in l1-split architecture |
US10778304B2 (en) * | 2017-02-08 | 2020-09-15 | Telefonaktiebolaget Lm Ericsson (Publ) | Polarization handling of beam-formed signals |
CN109792631B (en) | 2017-03-31 | 2021-06-08 | 华为技术有限公司 | Network congestion control method, equipment and system |
US11258496B2 (en) * | 2017-04-13 | 2022-02-22 | Sony Corporation | Communication devices and methods with hybrid beamforming |
CN108736941A (en) * | 2017-04-18 | 2018-11-02 | 中国移动通信有限公司研究院 | A kind of data transmission method, base station and terminal |
US10237418B2 (en) | 2017-04-21 | 2019-03-19 | Oracle International Corporation | Methods, systems, and computer readable media for charging based on radio congestion in mobile networks |
CN108964723A (en) * | 2017-05-17 | 2018-12-07 | 索尼公司 | Electronic equipment and communication means |
US10051685B1 (en) * | 2017-05-22 | 2018-08-14 | Hewlett Packard Enterprise Development Lp | Adapting radios of millimeter-wave devices |
WO2018217142A1 (en) * | 2017-05-23 | 2018-11-29 | Telefonaktiebolaget Lm Ericsson (Publ) | Core network node and method therein for obtaining a decision of a cn/ ran endpoint pair for user plane session in a radio communications network |
EP3639384A1 (en) | 2017-06-14 | 2020-04-22 | Interdigital Patent Holdings, Inc. | Methods and system for mimo transmissions in millimeter wave wlans |
US10735316B2 (en) | 2017-06-29 | 2020-08-04 | Futurewei Technologies, Inc. | Receiver directed anonymization of identifier flows in identity enabled networks |
WO2019006730A1 (en) * | 2017-07-06 | 2019-01-10 | 华为技术有限公司 | Beam-forming training method, receiving device and sending device |
US10051488B1 (en) | 2017-10-19 | 2018-08-14 | At&T Intellectual Property I, L.P. | Dual mode communications device with remote device feedback and methods for use therewith |
CN107733819B (en) * | 2017-09-13 | 2020-07-03 | 北京邮电大学 | Polarized channel XPD estimation algorithm based on ISLS |
EP3695531A4 (en) | 2017-10-12 | 2020-12-09 | Jeffrey Freedman | Hybrid beamforming rain fade mitigation |
JP7089046B2 (en) | 2017-11-15 | 2022-06-21 | ノキア テクノロジーズ オサケユイチア | Allow application for direct discovery |
EP3493419B1 (en) * | 2017-12-04 | 2021-01-20 | Apple Inc. | Techniques for beamforming in multi-user systems |
TWI645689B (en) * | 2017-12-15 | 2018-12-21 | 財團法人工業技術研究院 | Wireless communication device with hybrid beamforming and control method thereof |
CN109995393B (en) * | 2017-12-29 | 2021-09-21 | 华为技术有限公司 | Correction device and method |
EP4243300A3 (en) * | 2018-01-19 | 2023-10-25 | Lenovo (Singapore) Pte. Ltd. | Channel compression matrix parameters |
CN108337030B (en) * | 2018-02-07 | 2020-06-30 | 东南大学 | High-efficiency beam forming method, device and equipment in multi-antenna system |
CN112136279B (en) * | 2018-05-17 | 2022-07-29 | 三菱电机株式会社 | Wireless communication apparatus and wireless communication method |
CN112075033B (en) * | 2018-05-25 | 2024-02-09 | 三星电子株式会社 | Beam codebook generating method of 5G terminal |
CN108832980B (en) * | 2018-05-31 | 2021-06-25 | 西安电子科技大学 | Analog/digital mixed beam forming method based on ISA |
CN108809397B (en) * | 2018-06-27 | 2020-06-30 | 东南大学 | High-efficiency digital-analog hybrid beam forming method, device and equipment in multi-antenna system |
CN108900461B (en) * | 2018-06-28 | 2020-10-13 | 东南大学 | Wireless communication system broadband signal design method based on large-scale MIMO |
US11349539B2 (en) * | 2018-06-29 | 2022-05-31 | Apple Inc. | Spatial thermal density reduction for MMWAVE antenna arrays |
EP3588800A1 (en) * | 2018-06-29 | 2020-01-01 | FRAUNHOFER-GESELLSCHAFT zur Förderung der angewandten Forschung e.V. | Antenna array codebook with beamforming coefficients adapted to an arbitrary antenna response of the antenna array |
WO2020022856A1 (en) * | 2018-07-27 | 2020-01-30 | 엘지전자 주식회사 | Method and apparatus for reporting channel state information in wireless communication system |
US10833742B2 (en) * | 2018-08-10 | 2020-11-10 | At&T Intellectual Property I, L.P. | Determining channel state information in advanced networks |
US11190245B2 (en) * | 2018-09-07 | 2021-11-30 | Telefonaktiebolaget Lm Ericsson (Publ) | Port to antenna mapping design in virtualized active antenna system (AAS) |
US11197153B2 (en) * | 2018-09-27 | 2021-12-07 | Amber Solutions, Inc. | Privacy control and enhancements for distributed networks |
US11349296B2 (en) | 2018-10-01 | 2022-05-31 | Intelesol, Llc | Solid-state circuit interrupters |
US10797746B2 (en) * | 2018-11-16 | 2020-10-06 | Ossia Inc. | Coded antenna array |
CN111211819B (en) * | 2018-11-21 | 2022-04-01 | 中国移动通信有限公司研究院 | Downlink signal sending method of horizontal antenna array and base station |
US10680684B1 (en) * | 2018-11-21 | 2020-06-09 | Samsung Electronics Co., Ltd | System and method for analog beamforming for single-connected antenna array |
US10764786B2 (en) | 2018-12-05 | 2020-09-01 | At&T Mobility Ii Llc | Machine learning between radio loading and user experience |
EP3683975A1 (en) * | 2019-01-17 | 2020-07-22 | Mitsubishi Electric R&D Centre Europe B.V. | Method for enabling analog precoding and analog combining |
US10778298B1 (en) | 2019-03-29 | 2020-09-15 | At&T Intellectual Property I, L.P. | Context-based precoding matrix computations for radio access network for 5G or other next generation network |
US10715242B1 (en) * | 2019-09-25 | 2020-07-14 | Facebook, Inc. | Grouping antenna elements to enhanced an antenna array response resolution |
US11503611B2 (en) | 2019-10-29 | 2022-11-15 | Hon Lin Technology Co., Ltd. | Method and apparatus for allocation of resources in a wireless communication system |
EP3826256B1 (en) * | 2019-11-19 | 2023-07-12 | RivieraWaves | Digital pre-distortion method for ofdm-based communication systems |
JP2023510174A (en) | 2019-12-31 | 2023-03-13 | バヤー イメージング リミテッド | Systems and methods for shaping beams produced by antenna arrays |
US11265055B2 (en) | 2020-02-21 | 2022-03-01 | Qualcomm Incorporated | Flexible beamforming using frequency-division multiplexing |
US11224012B1 (en) | 2020-06-18 | 2022-01-11 | T-Mobile Usa, Inc. | Simulating continuous millimeter wave band access to a telecommunications network |
EP4197086A1 (en) | 2020-08-11 | 2023-06-21 | Amber Semiconductor, Inc. | Intelligent energy source monitoring and selection control system |
CN116547866A (en) * | 2020-12-23 | 2023-08-04 | 华为技术有限公司 | Method and apparatus for wireless communication |
TW202316824A (en) | 2021-10-14 | 2023-04-16 | 財團法人工業技術研究院 | Analog beamformer in array antenna and operating method thereof |
US11342973B1 (en) * | 2021-10-19 | 2022-05-24 | King Faisal University | System and method for maintaining link communications in millimeter wave cellular networks |
WO2023098809A1 (en) * | 2021-12-01 | 2023-06-08 | The University Of Hong Kong | Systems and methods for radio frequency interference suppression in radar |
US11811470B2 (en) * | 2022-01-11 | 2023-11-07 | Charter Communications Operating, Llc | Decode signal compensation in a wireless system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007044597A2 (en) * | 2005-10-05 | 2007-04-19 | Qualcomm Incorporated | Peer-to-peer communication in ad hoc wireless network |
US20100268775A1 (en) * | 2009-04-15 | 2010-10-21 | Klaus Franz Doppler | Method, apparatus and computer program product for providing an indication of device to device communication availability |
US20120079019A1 (en) | 2010-09-27 | 2012-03-29 | Nokia Corporation | Method and apparatus for sharing user information |
US20120093098A1 (en) * | 2008-10-29 | 2012-04-19 | Nokia Corporation | Apparatus and method for dynamic communication resource allocation for device-to-device communications in a wireless communication system |
US20130040677A1 (en) * | 2011-08-08 | 2013-02-14 | Samsung Electronics Co. Ltd. | Apparatus and method for allocating d2d id of user terminal in ad-hoc network |
WO2013062351A1 (en) | 2011-10-26 | 2013-05-02 | 엘지전자 주식회사 | Method for performing inter-cell d2d communication in wireless communication system and device therefor |
Family Cites Families (48)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3889996B2 (en) * | 2002-07-10 | 2007-03-07 | 株式会社日立製作所 | Network information collection management system |
EP2760247A1 (en) * | 2006-10-03 | 2014-07-30 | Qualcomm Incorporated | Re-synchronization of temporary UE IDS in a wireless communication system |
WO2009004590A2 (en) * | 2007-07-03 | 2009-01-08 | Nokia Siemens Networks Oy | Method, apparatus, system and computer program for key parameter provisioning |
US9019902B2 (en) * | 2008-11-11 | 2015-04-28 | Qualcomm Incorporated | Channel quality feedback in multicarrier systems |
AU2009336355A1 (en) * | 2009-01-06 | 2011-07-21 | Sharp Kabushiki Kaisha | Mobile communication system, QoS control station, and mobile station |
WO2010094334A1 (en) * | 2009-02-19 | 2010-08-26 | Telefonaktiebolaget Lm Ericsson (Publ) | Traffic control for roaming subscribers |
US9294560B2 (en) | 2009-06-04 | 2016-03-22 | Bae Systems Plc | System and method of analysing transfer of data over at least one network |
US8666403B2 (en) | 2009-10-23 | 2014-03-04 | Nokia Solutions And Networks Oy | Systems, methods, and apparatuses for facilitating device-to-device connection establishment |
CN102056140B (en) | 2009-11-06 | 2013-08-07 | 中兴通讯股份有限公司 | Method and system for acquiring machine type communication terminal information |
CN101711041B (en) * | 2009-12-09 | 2012-10-17 | 华为技术有限公司 | Congestion control method, operation-maintenance center equipment and base station |
US8787174B2 (en) * | 2009-12-31 | 2014-07-22 | Tekelec, Inc. | Methods, systems, and computer readable media for condition-triggered policies |
KR101871707B1 (en) * | 2010-04-02 | 2018-06-27 | 엘지전자 주식회사 | User equipment apparatus and method for feedback channel state information in wireless communication system |
US8848817B2 (en) | 2010-04-30 | 2014-09-30 | Texas Instruments Incorporated | Transmission modes and signaling for uplink MIMO support or single TB dual-layer transmission in LTE uplink |
EP2757818A3 (en) * | 2010-05-07 | 2014-09-24 | Huawei Technologies Co., Ltd. | Method and system for quantized feedback rate adaptation in a communication system |
EP2388931B1 (en) * | 2010-05-21 | 2017-09-13 | Imec | Method and system for mixed analog/digital beamforming in wireless communication systems |
US8917600B2 (en) * | 2010-06-25 | 2014-12-23 | Telefonaktiebolaget L M Ericsson (Publ) | Technique for introducing a real-time congestion status in a policy decision for a cellular network |
US8639198B2 (en) * | 2010-06-30 | 2014-01-28 | Samsung Electronics Co., Ltd. | Systems and methods for 8-TX codebook and feedback signaling in 3GPP wireless networks |
US20120220286A1 (en) | 2010-08-17 | 2012-08-30 | Texas Instruments Incorporated | Periodic Channel Quality Indicator on Physical Uplink Control Channel for Carrier Aggregation |
JP5451906B2 (en) * | 2010-09-01 | 2014-03-26 | シャープ株式会社 | User terminal, base station, joint coding method and coder based on binary tree |
US8693421B2 (en) | 2010-09-02 | 2014-04-08 | Texas Instruments Incorporated | Downlink 8 TX codebook sub-sampling for CSI feedback |
KR101835326B1 (en) | 2010-09-26 | 2018-03-07 | 엘지전자 주식회사 | Method and apparatus for efficient feedback in a wireless communication system supporting multiple antenna |
KR101752824B1 (en) * | 2010-09-29 | 2017-06-30 | 삼성전자주식회사 | Method and apparatus for feedback in multi user-multiple input multiple output system |
WO2012044088A2 (en) * | 2010-09-29 | 2012-04-05 | 엘지전자 주식회사 | Method and apparatus for efficient feedback in a wireless communication system that supports multiple antennas |
JP2012100254A (en) * | 2010-10-06 | 2012-05-24 | Marvell World Trade Ltd | Codebook subsampling for pucch feedback |
CN102447501B (en) * | 2010-10-07 | 2015-04-29 | 上海贝尔股份有限公司 | Codebook sub-sampling method applied to LTE-A system and device thereof |
US8681622B2 (en) * | 2010-12-17 | 2014-03-25 | Tekelec, Inc. | Policy and charging rules function (PCRF) and performance intelligence center (PIC) based congestion control |
WO2012142437A1 (en) | 2011-04-13 | 2012-10-18 | Interdigital Patent Holdings, Inc | Methods, systems and apparatus for managing and/or enforcing policies for managing internet protocol ("ip") traffic among multiple accesses of a network |
KR101839812B1 (en) * | 2011-08-11 | 2018-03-19 | 삼성전자주식회사 | Method and apparatus for mixed analog and digital beam forming |
KR20130017572A (en) | 2011-08-11 | 2013-02-20 | 삼성전자주식회사 | Method and apparatus for determining analog beam in hybrid beamforming system |
WO2013062310A1 (en) * | 2011-10-24 | 2013-05-02 | 엘지전자 주식회사 | Method for allowing base station to support device-to-device (d2d) communication in wireless communication system, and method for allowing d2d device to efficiently transmit d2d communication request signal |
KR101311523B1 (en) | 2011-10-26 | 2013-09-25 | 주식회사 케이티 | Network load distribution method between heterogeneous networks |
US9549341B2 (en) * | 2012-04-03 | 2017-01-17 | Nokia Solutions And Networks Oy | Method and network element for traffic flow treatment in a core network of a communication network |
US20130286960A1 (en) * | 2012-04-30 | 2013-10-31 | Samsung Electronics Co., Ltd | Apparatus and method for control channel beam management in a wireless system with a large number of antennas |
EP2873257A4 (en) * | 2012-07-10 | 2016-03-09 | Ericsson Telefon Ab L M | Reducing signaling load caused by change of terminal location |
US8917708B2 (en) * | 2012-09-28 | 2014-12-23 | Intel Corporation | Discovery and operation of hybrid wireless wide area and wireless local area networks |
US9432168B2 (en) * | 2012-12-19 | 2016-08-30 | Lg Electronics Inc. | Method and apparatus for transmitting and receiving channel status information (CSI) for supporting 256QAM in wireless access system |
US9143212B2 (en) * | 2013-02-25 | 2015-09-22 | Texas Instruments Incorporated | Codebook sub-sampling for CSI feedback on PUCCH for 4Tx MIMO |
US9698887B2 (en) * | 2013-03-08 | 2017-07-04 | Qualcomm Incorporated | Systems and methods for enhanced MIMO operation |
WO2014158208A1 (en) | 2013-03-29 | 2014-10-02 | Intel Corporation | Orthogonal beamforming for multiple user multiple-input and multiple-output (mu-mimo) |
US9722929B2 (en) * | 2013-04-08 | 2017-08-01 | Telefonaktiebolaget Lm Ericsson (Publ) | Congestion aware throughput targets |
WO2014193475A1 (en) | 2013-05-31 | 2014-12-04 | Intel IP Corporation | Hybrid digital and analog beamforming for large antenna arrays |
US10904946B2 (en) * | 2014-03-31 | 2021-01-26 | Convida Wireless, Llc | Overload control and coordination between M2M service layer and 3GPP networks |
US9485685B2 (en) * | 2014-06-13 | 2016-11-01 | Telefonaktiebolaget Lm Ericsson (Publ) | Congestion monitoring of mobile entities |
US10728793B2 (en) * | 2014-06-30 | 2020-07-28 | Telefonakitiebolaget L M Ericsson (Publ) | Aggregation of congestion information |
MX370050B (en) * | 2014-10-07 | 2019-11-29 | Ericsson Telefon Ab L M | Monitoring an ability of a high latency wireless device to receive downlink data. |
KR20160042692A (en) * | 2014-10-10 | 2016-04-20 | 삼성전자주식회사 | Apparatus and method for controlling traffic in wireless communication systems |
US10129788B2 (en) * | 2015-03-11 | 2018-11-13 | Cisco Technology, Inc. | System and method for deferred delivery of content based on congestion in a network environment |
US10117127B2 (en) * | 2015-07-08 | 2018-10-30 | Oracle International Corporation | Methods, systems, and computer readable media for communicating radio access network congestion status information for large numbers of users |
-
2013
- 2013-12-12 WO PCT/US2013/074747 patent/WO2014193475A1/en active Application Filing
- 2013-12-12 US US14/784,256 patent/US9647735B2/en active Active
- 2013-12-12 CN CN201380075969.9A patent/CN105144600B/en active Active
- 2013-12-17 US US14/108,648 patent/US9071297B2/en active Active
- 2013-12-27 US US14/141,843 patent/US9559761B2/en active Active
-
2014
- 2014-05-22 CN CN201710494925.XA patent/CN107302390B/en active Active
- 2014-05-22 EP EP17182135.8A patent/EP3267720B1/en active Active
- 2014-05-22 EP EP14803471.3A patent/EP3005784A4/en not_active Withdrawn
- 2014-05-22 CN CN201480023271.7A patent/CN105144647B/en active Active
- 2014-05-22 EP EP14804412.6A patent/EP3005636B1/en active Active
- 2014-05-22 EP EP20189554.7A patent/EP3751752B1/en active Active
- 2014-05-22 CN CN201480023293.3A patent/CN105594246B/en active Active
- 2014-05-22 US US14/783,043 patent/US9935694B2/en active Active
- 2014-05-22 ES ES14804412.6T patent/ES2689020T3/en active Active
- 2014-05-22 WO PCT/US2014/039072 patent/WO2014193718A1/en active Application Filing
- 2014-05-22 WO PCT/US2014/039116 patent/WO2014193723A1/en active Application Filing
- 2014-05-22 HU HUE14804412A patent/HUE039774T2/en unknown
- 2014-05-23 EP EP14804124.7A patent/EP3005758B1/en active Active
- 2014-05-23 WO PCT/US2014/039313 patent/WO2014193749A1/en active Application Filing
- 2014-05-23 CN CN201480024584.4A patent/CN105165042B/en active Active
- 2014-05-26 TW TW103118240A patent/TWI556658B/en not_active IP Right Cessation
-
2015
- 2015-06-15 US US14/739,815 patent/US9553643B2/en active Active
-
2016
- 2016-05-20 HK HK16105779.8A patent/HK1217857A1/en not_active IP Right Cessation
- 2016-05-25 HK HK16105976.9A patent/HK1218029A1/en unknown
- 2016-05-25 HK HK16105977.8A patent/HK1218027A1/en not_active IP Right Cessation
- 2016-10-27 HK HK16112381.4A patent/HK1224478A1/en unknown
-
2017
- 2017-01-23 US US15/413,182 patent/US10312981B2/en active Active
-
2018
- 2018-03-16 HK HK18103676.5A patent/HK1244119A1/en unknown
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007044597A2 (en) * | 2005-10-05 | 2007-04-19 | Qualcomm Incorporated | Peer-to-peer communication in ad hoc wireless network |
US20120093098A1 (en) * | 2008-10-29 | 2012-04-19 | Nokia Corporation | Apparatus and method for dynamic communication resource allocation for device-to-device communications in a wireless communication system |
US20100268775A1 (en) * | 2009-04-15 | 2010-10-21 | Klaus Franz Doppler | Method, apparatus and computer program product for providing an indication of device to device communication availability |
US20120079019A1 (en) | 2010-09-27 | 2012-03-29 | Nokia Corporation | Method and apparatus for sharing user information |
US20130040677A1 (en) * | 2011-08-08 | 2013-02-14 | Samsung Electronics Co. Ltd. | Apparatus and method for allocating d2d id of user terminal in ad-hoc network |
WO2013062351A1 (en) | 2011-10-26 | 2013-05-02 | 엘지전자 주식회사 | Method for performing inter-cell d2d communication in wireless communication system and device therefor |
Non-Patent Citations (1)
Title |
---|
See also references of EP3005758A4 |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9071297B2 (en) | 2013-05-31 | 2015-06-30 | Intel IP Corporation | User equipment and methods for codebook subsampling for enhanced 4TX codebooks |
US9553643B2 (en) | 2013-05-31 | 2017-01-24 | Intel IP Corporation | User equipment and methods for codebook subsampling for enhanced 4TX codebooks |
US9559761B2 (en) | 2013-05-31 | 2017-01-31 | Intel IP Corporation | Proximity-based services discovery privacy |
US10312981B2 (en) | 2013-05-31 | 2019-06-04 | Intel IP Corporation | User equipment and methods for codebook subsampling for enhanced 4TX codebooks |
CN107409344A (en) * | 2015-03-17 | 2017-11-28 | 诺基亚技术有限公司 | Wireless routing |
US10993108B2 (en) | 2015-03-17 | 2021-04-27 | Nokia Technologies Oy | Wireless routing |
Also Published As
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9559761B2 (en) | Proximity-based services discovery privacy | |
US9883388B2 (en) | Ephemeral identity for device and service discovery | |
CN105191370B (en) | Identifier for proximity services | |
TWI763792B (en) | Network access privacy | |
EP2901811B1 (en) | Systems and methods for device-to-device communication in the absence of network coverage | |
KR101836014B1 (en) | Fine-timing measurement for time-of-flight positioning | |
US9510194B2 (en) | Open and encrypted wireless network access | |
KR101836434B1 (en) | Secure wireless location interface protocol | |
EP3031260B1 (en) | Access points and methods for access point selection using an information data structure | |
US20150045055A1 (en) | Time of flight responders | |
US20220078609A1 (en) | Digital key derivation distribution between a secure element and ultra-wide band module | |
US11825301B2 (en) | Secret construction of physical channels and signals |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 201480024584.4 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14804124 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2014804124 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |